Hi i run the following to verify if my ntp daemon is having the
overflow bug reported at
http://www.nessus.org/plugins/index.php?view=single&id=10647
/opt/nessus/bin/nessuscmd -V -i 10647 -p 123 192.168.10.165
It just gives 192.168.10.165 is up. Can anyone please let me know how
to verify the following.
Iam using nessus-scan version 3.2(Nessus-3.2.0-es4.i386.rpm) on RH.
one of my team mate mentioned that with Nessus version 1.4.5 on
windows. He gets the following message in the report .
An NTP server is running on the remote host. Make sure that
you are running the latest version of your NTP server,
as some versions have been found out to be vulnerable to
buffer overflows
Does this really mean a bug. should i apply the patch mentioned at
https://bugzilla.redhat.com/show_bug.cgi?id=34813
Thanks in advance.
Sudarshan
_______________________________________________
Plugins-writers mailing list
Plugins-writers@list.nessus.org
http://mail.nessus.org/mailman/listinfo/plugins-writers
overflow bug reported at
http://www.nessus.org/plugins/index.php?view=single&id=10647
/opt/nessus/bin/nessuscmd -V -i 10647 -p 123 192.168.10.165
It just gives 192.168.10.165 is up. Can anyone please let me know how
to verify the following.
Iam using nessus-scan version 3.2(Nessus-3.2.0-es4.i386.rpm) on RH.
one of my team mate mentioned that with Nessus version 1.4.5 on
windows. He gets the following message in the report .
An NTP server is running on the remote host. Make sure that
you are running the latest version of your NTP server,
as some versions have been found out to be vulnerable to
buffer overflows
Does this really mean a bug. should i apply the patch mentioned at
https://bugzilla.redhat.com/show_bug.cgi?id=34813
Thanks in advance.
Sudarshan
_______________________________________________
Plugins-writers mailing list
Plugins-writers@list.nessus.org
http://mail.nessus.org/mailman/listinfo/plugins-writers