Am 03.01.2017 um 19:02 schrieb Christian Fischer:
Hi,

On 03.01.2017 18:24, Reindl Harald wrote:

Am 03.01.2017 um 18:17 schrieb Christian Fischer:
On 03.01.2017 17:56, Reindl Harald wrote:
Am 03.01.2017 um 17:46 schrieb Michael Meyer:
*** Reindl Harald wrote:

the scan is from yesterday, the issues are months old (includinmg
the openssh windows bruteforce nonsense on linux machines with
key-only-auth on recent Fedora steups)

"openssh windows bruteforce nonsense on linux machines"?

* no windows machine
* no 'auth_password' at all
* linux distributions don't raise version numbers but release fixes

hence flagged as false positive yesterday since i not no longer can see
that red colored nonsense initially reported months ago

High (CVSS: 7.8)
NVT: OpenSSH 'auth_password' Denial of Service Vulnerability (Windows)
(OID: 1.3.6.1.4.1.25623.1.0.809121)
Product detection result: cpe:/a:openbsd:openssh:7.2 by SSH Server type
and version (OID: 1.3.6.1.4.1.25623.1.0.10267)

Installed version: 7.2
Fixed version:     7.3

it would make sense if you provide your used feed version:

GSA:

Administration -> NVT Feed (OpenVAS 8 and below)
Extras -> Feed status (OpenVAS 9+)

as you can see in this thread the last feed update failed but it should
have been fixed at least *two months* before

on machines with the settings below talking about 'auth_password' is
wrong to begin with as long you are not been able as scanner to find any
exception where password logins are allowed at all

PasswordAuthentication          no
ChallengeResponseAuthentication no
GSSAPIAuthentication            no
GSSAPICleanupCredentials        no

instead of pointing fingers it would really help if you just provide the
asked information about your feed status as well as the output of the
NVT "OS Detection Consolidation (1.3.6.1.4.1.25623.1.0.105937)"

what did you not understand in the simple fact that i in the meantime updated the feed and so hardly can tell you what version it *was* before doing so
_______________________________________________
Openvas-discuss mailing list
[email protected]
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss

Reply via email to