From ${URL} : > For OpenVAS Administrator, this is a security release addressing a very > serious security bug and it is highly recommended to update any > installation of OpenVAS Administrator 1.2 and 1.3 with the corresponding > release. > > A software bug in OpenVAS Administrator allowed an attacker to bypass > the OAP authentication procedure. The attack vector was remotely > available in case OpenVAS Administrator was listening on a public > network interface. In case of successful attack, the attacker was able > to create and modify users and could use the gained privileges to take > control over an OpenVAS installation if the Scanner and/or Manager > instances controlled by this Administrator instance were also listening > on public network interfaces. @maintainer(s): since the package has never been marked as stable, we don't need to stabilize it. Please remove the affected versions from the tree.
Bumped. Old versions can be removed in a few days if no issues pop up.
Arches, please clean up vulnerable versions noglsa needed, no version stable.
It has been more then a month, maintainer(s), please drop the vulnerable version.
Vulnerable versions dropped. Closing.
CVE-2013-6766 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6766): OpenVAS Administrator 1.2 before 1.2.2 and 1.3 before 1.3.2 allows remote attackers to bypass the OAP authentication restrictions and execute OAP commands via a crafted OAP request for version information, which causes the state to be set to CLIENT_AUTHENTIC.