![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.103827 |
Category: | General |
Title: | OpenVAS Manager Authentication Bypass Vulnerability (OVSA20131108) |
Summary: | The remote OpenVAS Manager is prone to an authentication bypass. |
Description: | Summary: The remote OpenVAS Manager is prone to an authentication bypass. Vulnerability Insight: A software bug in the server module 'OpenVAS Manager' allowed to bypass the OMP authentication procedure. The attack vector is remotely available in case public OMP is enabled. In case of successful attack, the attacker gains partial rights to execute OMP commands. The bypass authentication is, however, incomplete and several OMP commands will fail to execute properly. Vulnerability Impact: Attackers can exploit these issues to gain unauthorized access to the affected application and perform certain actions. Solution: Update to version 3.0.7 or 4.0.4. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2013-6765 http://lists.wald.intevation.org/pipermail/openvas-announce/2013-November/000157.html http://www.openwall.com/lists/oss-security/2013/11/10/2 |
Copyright | Copyright (C) 2013 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |