Hello Bernd,

On Dienstag, 10. März 2009, [email protected] wrote:
> Hi Tarik,

unfortunately Tarik is not active for OpenVAS since quite a while.
 
> Since your plugin was added to OpenVAS, all the hosts in our network (more
> than 700) suddenly show up a security hole for ldap.

It should have been part of OpenVAS for a very long time.
Actually it should not have happened suddenly. Or did you just executed
the first scan with OpenVAS?

> here is the output from an html page:
>...

> I assume "Can't con" means "Cannot connect."

The broken string comes from ldapsearch I guess.

> If the plugin cannot connect 
> than there should not be any vulnerability present.  Even hosts that are
>   firewalled and do not allow acces to port 389/tcp  and hosts that have port
> 389/tcp closed (because an ldap server is not running) show up as having this
> ldap vulnerability.
> 
> What am I doing wrong?  How can I avoid all these false positives? I would
> very much appreciate your help in this matter.

We will look into this.

Best

        Jan


-- 
Dr. Jan-Oliver Wagner | ++49-541-335083-0  |  http://www.intevation.de/
Intevation GmbH, Neuer Graben 17, 49074 Osnabrück | AG Osnabrück, HR B 18998
Geschäftsführer: Frank Koormann, Bernhard Reiter, Dr. Jan-Oliver Wagner
_______________________________________________
Openvas-plugins mailing list
[email protected]
http://lists.wald.intevation.org/mailman/listinfo/openvas-plugins

Reply via email to