Hi i run the following to verify if my ntp daemon is having the overflow bug reported at http://www.nessus.org/plugins/index.php?view=single&id=10647
/opt/nessus/bin/nessuscmd -V -i 10647 -p 123 192.168.10.165 It just gives 192.168.10.165 is up. Can anyone please let me know how to verify the following. Iam using nessus-scan version 3.2(Nessus-3.2.0-es4.i386.rpm) on RH. one of my team mate mentioned that with Nessus version 1.4.5 on windows. He gets the following message in the report . An NTP server is running on the remote host. Make sure that you are running the latest version of your NTP server, as some versions have been found out to be vulnerable to buffer overflows Does this really mean a bug. should i apply the patch mentioned at https://bugzilla.redhat.com/show_bug.cgi?id=34813 Thanks in advance. Sudarshan _______________________________________________ Nessus mailing list [email protected] http://mail.nessus.org/mailman/listinfo/nessus
