On Fri, 2004-04-30 at 16:07, George Theall wrote:
> The trace suggests you're calling the plugin by invoking nasl at the
> commandline.  If so, realize that this method doesn't give plugins
> access to KBs, which plugins such as this require. 
right - I've re-run the scan using the client and get the same output..
not vulnerable  && it should be reported as vuln.

here's the content of the kb:
1083593490 3 Launched/10180=1
1083593490 1 SentData/10180/INFO/1=The remote host is up
1083593490 1 Success/10180=1
1083593491 3 Launched/10330=1
1083593491 1 SSL/password=
1083593491 3 Launched/12204=1
1083593491 3 Launched/11011=1
1083593491 1 Known/tcp/139=smb
1083593491 1 Services/smb=139
1083593491 1 SentData/11011/INFO/1=An SMB server is running on this port
1083593491 1 Success/11011=1
1083593491 1 SMB/transport=139
1083593491 3 Launched/12209=1


This is Nessus 2.0.10 for Linux 2.4.20-28.9
compiled with gcc version 3.2.2 20030222 (Red Hat Linux 3.2.2-5)
Current setup :
        Experimental session-saving    : enabled
        Experimental KB saving         : enabled
        Thread manager                 : fork
        nasl                           : 2.0.10
        libnessus                      : 2.0.10
        SSL support                    : enabled
        SSL is used for client / server communication
        Running as euid                : 0
 
thanks,
tan


_______________________________________________
Nessus mailing list
[EMAIL PROTECTED]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to