On Thu, Jan 30, 2003 at 12:19:42PM -0800, Carrie Lee wrote:
>    Within a few hours of running a nessus scan on a host, the host became
>    infected with some viruses associated with the vulnerabilities found
>    by nessus.  Specifically, when I ran the scan, it said that the host
>    was infected with Code Red, although it wasn't a few hours before the
>    scan.  About 6 hours later, the system became infected with a bunch of
>    other viruses that exploit the found IIS vulnerabilities.  I would
>    like to find out if some of the plugins are not benign or even
>    malicious.  Was this a coincidence or not?

Coincidence. Nessus does not infect hosts. The only "virus" it would
send is the EICAR test string, sent to the SMTP server, and which is not
really a virus, only a string designed to make the alarms of the
antivirus beep like crazy.

>    Does anyone know where I can view the source for the plugins, or if
>    some of the plugins actually exploit the vulnerability and alert the
>    developer?  (I don't mean to offend anyone, but I need to know before
>    I run it again).

The plugins are in /usr/local/lib/nessus/plugins/. 


                                -- Renaud

Reply via email to