Summary: | <net-analyzer/openvas-administrator-1.3.2 : security bypass (CVE-2013-6766) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | trivial | CC: | alexanderyt, hanno |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2013/11/10/2 | ||
Whiteboard: | ~1 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Bumped. Old versions can be removed in a few days if no issues pop up. Arches, please clean up vulnerable versions noglsa needed, no version stable. It has been more then a month, maintainer(s), please drop the vulnerable version. Vulnerable versions dropped. Closing. CVE-2013-6766 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6766): OpenVAS Administrator 1.2 before 1.2.2 and 1.3 before 1.3.2 allows remote attackers to bypass the OAP authentication restrictions and execute OAP commands via a crafted OAP request for version information, which causes the state to be set to CLIENT_AUTHENTIC. |
From ${URL} : > For OpenVAS Administrator, this is a security release addressing a very > serious security bug and it is highly recommended to update any > installation of OpenVAS Administrator 1.2 and 1.3 with the corresponding > release. > > A software bug in OpenVAS Administrator allowed an attacker to bypass > the OAP authentication procedure. The attack vector was remotely > available in case OpenVAS Administrator was listening on a public > network interface. In case of successful attack, the attacker was able > to create and modify users and could use the gained privileges to take > control over an OpenVAS installation if the Scanner and/or Manager > instances controlled by this Administrator instance were also listening > on public network interfaces. @maintainer(s): since the package has never been marked as stable, we don't need to stabilize it. Please remove the affected versions from the tree.