Hi,

On 02.11.2016 10:00, Tomasz Jadowski wrote:
> On Wed, Oct 26, 2016 at 03:30:49PM +0200, Christian Fischer wrote:
>> the debugging of this detection depends if you're getting the above log
>> entry or not. Also make sure that your Authenticated Scans are actually
>> working correctly.
>>
> 
> Right, I had some minor problems with correct scan. Now, I have a
> some result in scan report:
> 
> Summary
> 
> This script finds the installed PHP version on Linux and saves the version in 
> KB.
> Vulnerability Detection Result
> 
> Detected PHP
> Version: 5.x.xx
> Location: /usr/bin/php
> CPE: cpe:/a:php:php:5.x.xx
> 
> Concluded from version identification result:
> PHP 5.x.xx
> 
> Vulnerability Detection Method
> 
> Details: Linux PHP Detection (OID: 1.3.6.1.4.1.25623.1.0.103592)
> 
> Version used: $Revision: 3592 $

ok that looks good now.

> but I suppose that OpenVAS rely on official Red Hat Security Advisory. Am I 
> right? 

Not exactly in this case. As explained previously there are two types of
vulnerability checks OpenVAS is relying on:

1. Local Security Checks (LSC)

These are auto generated based on Distro Advisories (Like Red Hat RHSA
or Debian DSA) and are checking for vulnerabilities based on the
installed Distro package names like 5.6.27+dfsg-0+deb8u1. These checks
mostly won't catch your custom build PHP as long as it is not installed
via your package manager.

2. Network Vulnerability Tests (NVT)

These are manually created tests which are e.g. checking actively and/or
version/CPE based (e.g. cpe:/a:php:php:5.6.26) for a vulnerability. For
these it doesn't matter if you have a custom build PHP or not, as long
as PHP is correctly detected.

As most of the PHP based vulnerabilities are version/banner based they
are prone to false positives on linux-like systems due to backports.
These are getting a Quality of Detection (QoD) value of 30% and won't
show up in a default report (QoD of 70%+ is needed here). Because of
this you might need to update your filter to show also vulnerabilities
with lower QoD values.

Regards,

-- 

Christian Fischer | PGP Key: 0x54F3CE5B76C597AD
Greenbone Networks GmbH | http://greenbone.net
Neuer Graben 17, 49074 Osnabrück, Germany | AG Osnabrück, HR B 202460
Geschäftsführer: Lukas Grunwald, Dr. Jan-Oliver Wagner
_______________________________________________
Openvas-plugins mailing list
Openvas-plugins@wald.intevation.org
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-plugins

Reply via email to