Correct me if I'm wrong, but this plugin uses a sure-fire method of determining that the version we know of beagle is on the host (I don't know of anything else that will respond like beagle does to "43ffffff0000000004120") Right?


An easy place to draw the line is the actual binary you are executing on the other end. Beagle is known as a binary from an untrusted source with malicious intent. If you send peculiar packets to discover certain bugs in older versions of OpenSSL, you're sending them to a binary that is not known to be malicious, but may be buggy (yes, I know that the openssl binary could have been swapped by a cracker for a malicious version)



I don't think that now is the time to be drawing such a line. I'm sure that as time goes on, the best place to draw the line will be obvious.


In my opinion, the plugin should be left as is.


Renaud Deraison wrote:
On Fri, Jan 23, 2004 at 07:32:31AM -0500, Jim Hendrick wrote:

To answer your question however, there are very few "normal" programs that
would send "43ffffff0000000004120" as opposed to "GET / HTTP/1.0".


Where do you draw the line then ? Dozens of plugins send very peculiar
packets (SSL negociations, terminal services recognition, and so on...).

Some of the packets sent are intentionally broken (ie: you're not more
likely to see them on a network than you're likely to see the bagle
probe command), so any virus could "trigger" on them instead.




-- Renaud _______________________________________________ Nessus mailing list [EMAIL PROTECTED] http://mail.nessus.org/mailman/listinfo/nessus

-- Michael Jensen Information Systems/Security Manager In2M Corporation 801.984.4221

_______________________________________________
Nessus mailing list
[EMAIL PROTECTED]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to