Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Sun, 10 Nov 2013 07:33:40 -0500 (EST)
From: cve-assign@...re.org
To: oss-security@...ts.openwall.com
Cc: cve-assign@...re.org
Subject: CVE-2013-6765 CVE-2013-6766 for OpenVAS 4.0.4/1.3.2/etc.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> http://lists.wald.intevation.org/pipermail/openvas-announce/2013-November/000157.html

> For OpenVAS Manager, this is a security release addressing a serious
> security bug and it is highly recommended to update any installation of
> OpenVAS Manager 3.0 and 4.0 with the corresponding release.
> 
> A software bug in OpenVAS Manager allowed an attacker to bypass the OMP
> authentication procedure. The attack vector was remotely available in
> case OpenVAS Manager was listening on a public network interface. In
> case of successful attack, the attacker gained partial rights to execute
> OMP commands.  The bypass authentication was, however, incomplete and
> several OMP commands failed to execute properly.

Use CVE-2013-6765.


> For OpenVAS Administrator, this is a security release addressing a very
> serious security bug and it is highly recommended to update any
> installation of OpenVAS Administrator 1.2 and 1.3 with the corresponding
> release.
> 
> A software bug in OpenVAS Administrator allowed an attacker to bypass
> the OAP authentication procedure. The attack vector was remotely
> available in case OpenVAS Administrator was listening on a public
> network interface. In case of successful attack, the attacker was able
> to create and modify users and could use the gained privileges to take
> control over an OpenVAS installation if the Scanner and/or Manager
> instances controlled by this Administrator instance were also listening
> on public network interfaces.

Use CVE-2013-6766.

Apparently a discloser will provide technical details at a later date.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJSf3zLAAoJEKllVAevmvms5ukH/2N+qMKDquLPObf3uvgBiNu5
HFD2870eX6efagcpmQHg3hI4rVxNV2B5JfhUewcX2PT3GMmYGpYEbsQU9wS/L0lR
Fs1XesLvQoZCpiZ99V1t7UyQT10yy4fTgA7PGYKalNMgkPpdZvipJXDhqcFnnzCv
AFcFggOlFrI0fCZ0tMXPNzxNzNGXPxplMjbU/tTNz/LBCGAcA3ARjUAhzSiWvcV8
LoVULOqYfxSEHSi1kL0juXJ2AGl1tl0DhZJoqFPLSmrlv+kmCK1cyKkuwlaPqxoi
/VIRBW+gs3A9dm+BB8ReIb2hQkipM+uY1jsfI9ERofwnud0RgRN5mHZkxOj5W9Y=
=c9Ja
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.