Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 9 Sep 2011 23:07:34 +0200
From: "Jan-Oliver Wagner" <>
Cc: Josh Bressers <>,,
 Jan Lieskovsky <>,
 Stjepan Gros <>,
 Bugs NotHugs <>,
 "Steven M. Christey" <>
Subject: Re: [Openvas-devel] CVE Request -- openvas-scanner -- Insecure temporary file use by generation of an OVAL system characteristics document, when ovaldi support enabled


On Friday 09 September 2011 19:45:03 Josh Bressers wrote:
> Let's go with one ID. I don't see a reason to split these.
> Use CVE-2011-3351

I think it should be clarified:
_No one_ who is properly using OpenVAS with OpenVAS Feed or with the
Greenbone Feed is affected.

No OVAL script is even tried to be executed: no OVAL file is in the feed and
if you/someone copies one into your feed copy it is not being executed because
it has no valid signature.

So you need to switch to unsecure mode, then place OVAL files into your
feed copy, install ovaldi etc, etc.

Of course the OpenVAS developers will be fixing the problem regardless
of the practical relevance!

What frightens me is that a security advisory about OpenVAS 2 (a already
deprecated version) made it even into official advisories of CERTs.
The review process seems to not work as it should, no one ever checked
back wether this version is deprecated. So it should be easy to get faked
security alerts about some tools you don't like into official CERT advisories.
Or am I getting something wrong here?



Dr. Jan-Oliver Wagner |  ++49-541-335084-0  |
Greenbone Networks GmbH, Neuer Graben 17, 49074 Osnabrück | AG Osnabrück, HR B 202460
Geschäftsführer: Lukas Grunwald, Dr. Jan-Oliver Wagner

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.