Hi,

Fixed the issue, updated NVT will be available in coming OpenVAS feed.

Thanks for reporting!

Regards,
Antu Sanadi

On Thursday 01 September 2016 01:17 PM, Schwarz Stefan wrote:
Helmut,

i have an open support-ticket on that issue. There was a fix on that NVT
some weeks before, but now it seems to me that this is only related to SMB
on Linux. It seems to be fixed on Windows-machines. It shouldn't be a
vulnerability at all.

Stefan
-----Ursprüngliche Nachricht-----
Von: Openvas-discuss [mailto:openvas-discuss-boun...@wald.intevation.org] Im
Auftrag von Helmut Koers
Gesendet: Donnerstag, 1. September 2016 08:58
An: openvas-discuss@wald.intevation.org
Betreff: [Openvas-discuss] SMB Brute Force Logins With Default Credentials

A recent scan shows a lot of "SMB Brute Force Logins With Default
Credentials" on a single host. The details is always "It was possible to
login with the following credentials via the SMB protocol.
<User>:<Password>" with different user/password combinations.

The related host seems to have a guest sessions with any credentials allowed
.

Is it supposed to result in multiple vulnerabilities, or shouldn't this just
result in one vulnerability?

Thanks,
Helmut


_______________________________________________
Openvas-discuss mailing list
Openvas-discuss@wald.intevation.org
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss


--
Saner Personal
A free vulnerability mitigation
software. Build strong defense.
http://www.secpod.com/saner-personal.html

_______________________________________________
Openvas-discuss mailing list
Openvas-discuss@wald.intevation.org
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss

Reply via email to