Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 490938 (CVE-2013-6766) - <net-analyzer/openvas-administrator-1.3.2 : security bypass (CVE-2013-6766)
Summary: <net-analyzer/openvas-administrator-1.3.2 : security bypass (CVE-2013-6766)
Status: RESOLVED FIXED
Alias: CVE-2013-6766
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: http://www.openwall.com/lists/oss-sec...
Whiteboard: ~1 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2013-11-10 15:44 UTC by Agostino Sarubbo
Modified: 2014-06-08 00:23 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-11-10 15:44:27 UTC
From ${URL} :

> For OpenVAS Administrator, this is a security release addressing a very
> serious security bug and it is highly recommended to update any
> installation of OpenVAS Administrator 1.2 and 1.3 with the corresponding
> release.
> 
> A software bug in OpenVAS Administrator allowed an attacker to bypass
> the OAP authentication procedure. The attack vector was remotely
> available in case OpenVAS Administrator was listening on a public
> network interface. In case of successful attack, the attacker was able
> to create and modify users and could use the gained privileges to take
> control over an OpenVAS installation if the Scanner and/or Manager
> instances controlled by this Administrator instance were also listening
> on public network interfaces.



@maintainer(s): since the package has never been marked as stable, we don't need to stabilize it. Please remove the affected versions from the tree.
Comment 1 Hanno Böck gentoo-dev 2013-11-10 18:41:23 UTC
Bumped. Old versions can be removed in a few days if no issues pop up.
Comment 2 Yury German Gentoo Infrastructure gentoo-dev 2013-11-11 14:08:34 UTC
Arches, please clean up vulnerable versions

noglsa needed, no version stable.
Comment 3 Yury German Gentoo Infrastructure gentoo-dev 2013-12-26 20:14:44 UTC
It has been more then a month, maintainer(s), please drop the vulnerable version.
Comment 4 Chris Reffett (RETIRED) gentoo-dev Security 2013-12-27 00:18:14 UTC
Vulnerable versions dropped. Closing.
Comment 5 GLSAMaker/CVETool Bot gentoo-dev 2014-06-08 00:23:42 UTC
CVE-2013-6766 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6766):
  OpenVAS Administrator 1.2 before 1.2.2 and 1.3 before 1.3.2 allows remote
  attackers to bypass the OAP authentication restrictions and execute OAP
  commands via a crafted OAP request for version information, which causes the
  state to be set to CLIENT_AUTHENTIC.