|
Message-Id: <201311101233.rAACXe7D015250@linus.mitre.org> Date: Sun, 10 Nov 2013 07:33:40 -0500 (EST) From: cve-assign@...re.org To: oss-security@...ts.openwall.com Cc: cve-assign@...re.org Subject: CVE-2013-6765 CVE-2013-6766 for OpenVAS 4.0.4/1.3.2/etc. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > http://lists.wald.intevation.org/pipermail/openvas-announce/2013-November/000157.html > For OpenVAS Manager, this is a security release addressing a serious > security bug and it is highly recommended to update any installation of > OpenVAS Manager 3.0 and 4.0 with the corresponding release. > > A software bug in OpenVAS Manager allowed an attacker to bypass the OMP > authentication procedure. The attack vector was remotely available in > case OpenVAS Manager was listening on a public network interface. In > case of successful attack, the attacker gained partial rights to execute > OMP commands. The bypass authentication was, however, incomplete and > several OMP commands failed to execute properly. Use CVE-2013-6765. > For OpenVAS Administrator, this is a security release addressing a very > serious security bug and it is highly recommended to update any > installation of OpenVAS Administrator 1.2 and 1.3 with the corresponding > release. > > A software bug in OpenVAS Administrator allowed an attacker to bypass > the OAP authentication procedure. The attack vector was remotely > available in case OpenVAS Administrator was listening on a public > network interface. In case of successful attack, the attacker was able > to create and modify users and could use the gained privileges to take > control over an OpenVAS installation if the Scanner and/or Manager > instances controlled by this Administrator instance were also listening > on public network interfaces. Use CVE-2013-6766. Apparently a discloser will provide technical details at a later date. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJSf3zLAAoJEKllVAevmvms5ukH/2N+qMKDquLPObf3uvgBiNu5 HFD2870eX6efagcpmQHg3hI4rVxNV2B5JfhUewcX2PT3GMmYGpYEbsQU9wS/L0lR Fs1XesLvQoZCpiZ99V1t7UyQT10yy4fTgA7PGYKalNMgkPpdZvipJXDhqcFnnzCv AFcFggOlFrI0fCZ0tMXPNzxNzNGXPxplMjbU/tTNz/LBCGAcA3ARjUAhzSiWvcV8 LoVULOqYfxSEHSi1kL0juXJ2AGl1tl0DhZJoqFPLSmrlv+kmCK1cyKkuwlaPqxoi /VIRBW+gs3A9dm+BB8ReIb2hQkipM+uY1jsfI9ERofwnud0RgRN5mHZkxOj5W9Y= =c9Ja -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.