Mailing List Archive

plugin 24323 problem
Hi,

I have a Solaris 10 box which is vulnerable to Solaris 10 Telnet
authentication bypass but when I scan this box with nessus it doesn't report
the vulnerability. I am able to expolit it manually with command *# telnet
-l-fbdin 1.2.3.4* so the box really is exploitable. I also took a look at
network traffic with wireshark and nessus actually does expoit the box - it
logs into the box thru this vulnerabilty but nothing is reported then. I
tried to do it in GUI and also in cmd line: *C:\Program
Files\Tenable\Nessus>NessusCmd.exe>NessusCmd.exe -V -i 24323 1.2.3.4*.


So, is this a bug or am I missing something else ?


Thanks,
P
Re: plugin 24323 problem [ In reply to ]
On Sep 26, 2008, at 10:30 AM, P. Remek wrote:

> I have a Solaris 10 box which is vulnerable to Solaris 10 Telnet
> authentication bypass but when I scan this box with nessus it
> doesn't report the vulnerability. I am able to expolit it manually
> with command # telnet -l-fbdin 1.2.3.4 so the box really is
> exploitable. I also took a look at network traffic with wireshark
> and nessus actually does expoit the box - it logs into the box thru
> this vulnerabilty but nothing is reported then. I tried to do it in
> GUI and also in cmd line: C:\Program Files\Tenable
> \Nessus>NessusCmd.exe>NessusCmd.exe -V -i 24323 1.2.3.4.


Would you mind sending me privately a packet capture showing Nessus
running this particular plugin against a target?

George
--
theall@tenablesecurity.com



_______________________________________________
Nessus mailing list
Nessus@list.nessus.org
http://mail.nessus.org/mailman/listinfo/nessus