Hello all,
anyone feels like digging into this issue reported by Kevin?
Best
Jan
On Thursday 23 April 2009 00:07:35 you wrote:
> I found a response from you on the openvas-plugins mailing list archive
> regarding this plugin and was hoping to work with you to find the answer.
>
> Here is a link to that message:
> http://marc.info/?l=openvas-plugins&m=121084160209010&w=2
>
> In your response you mentioned a possible explanation. The msrpc_dcom2.nasl
> script had to be removed from openVAS and thus a dependency for the
> msrpc_dcom.nasl script is missing. You then stated you might be able to
> reproduce the problem but didn't have that service running on your XPSP2
> system. Here's where I can help. Just this morning while testing OpenVAS
> for the first time it reported the existence of this vulnerability on a
> computer I use. However I have verified the patch for the vulnerability and
> tested that computer with another scanner which reported that the computer
> is indeed not vulnerable. I can re-create the scenario as needed and offer
> whatever help to debug or trace the issue. As this particular vulnerability
> was associated with a widely known worm, I think it is very important for
> OpenVAS to be accurate. I have an affinity for the efforts on this project
> and may even lend my security and coding expertise in the future.
--
Dr. Jan-Oliver Wagner | ++49-541-335 08 30 | http://www.intevation.de/
Intevation GmbH, Neuer Graben 17, 49074 Osnabrück | AG Osnabrück, HR B 18998
Geschäftsführer: Frank Koormann, Bernhard Reiter, Dr. Jan-Oliver Wagner
_______________________________________________
Openvas-plugins mailing list
[email protected]
http://lists.wald.intevation.org/mailman/listinfo/openvas-plugins