Hi,

I am new with OpenVAS and still testing it. So perhaps, i am asking 
something silly.
I've installed OpenVAS from debian package in etch and ran my first scan 
against an internal host.
Results: 4 security holes.
Two of them are on mysql and other two on CUPS.
My debian etch  has mysql 5.0.32-7etch10 and cupsys 1.2.7-4etch7 (last 
official etch packages)
According to OpenVAS report, i should have installed mysql 5.0.66 and 
cupsys 1.3.10, but my versions also fix all these vulnerabilities.
What is wrong with this? Any idea?

Here you have OpenVAS reports

Thanks in advance

dav

. Vulnerability found on port mysql (3306/tcp) :
     Overview : This host is running MySQL, which is prone to Denial of 
Service Vulnerability.
     Vulnerability Insight :
            Issue is due to error while processing an empty bit string 
literal via a specially crafted SQL statement.
            Impact : Successful exploitation by remote attackers could 
cause denying access to legitimate users.
     Impact Level : Application
     Affected Software/OS :
            MySQL versions prior to 5.0.x - 5.0.66,
                                    5.1.x - 5.1.26, and
                                    6.0.x - 6.0.5 on all running platform.
     Fix : Update to version 5.0.66 or 5.1.26 or 6.0.6 or later.
     CVSS Score :
            CVSS Base Score     : 7.1 (AV:N/AC:M/Au:NR/C:N/I:N/A:C)
            CVSS Temporal Score : 5.6
     Risk factor : High
    CVE : CVE-2008-3963
    BID : 31081

. Vulnerability found on port mysql (3306/tcp) :
      Overview: According to its version number, the remote version of 
MySQL is prone to a security-bypass vulnerability.
      An attacker can exploit this issue to gain access to table files 
created by other users, bypassing certain security restrictions.
      NOTE 1: This issue was also assigned CVE-2008-4097 because 
CVE-2008-2079 was incompletely fixed, allowing symlink attacks.
      NOTE 2: CVE-2008-4098 was assigned because fixes for the vector 
described in CVE-2008-4097 can also be bypassed.
      This issue affects versions prior to MySQL 4 (prior to 4.1.24) and 
MySQL 5 (prior to 5.0.60).
     Solution:
      Updates are available. Update to newer Version.
     See also:
      http://www.securityfocus.com/bid/29106
     Risk factor : Medium
    CVE : CVE-2008-2079, CVE-2008-4097, CVE-2008-4098
    BID : 29106

. Vulnerability found on port ipp (631/tcp) :
      Overview: This host is running CUPS (Common UNIX Printing System) 
Service, which is prone to Buffer Overflow and Integer Overflow 
Vulnerabilities.
      Vulnerability Insight:
      The flaws are caused due to,
      - an error in the implementation of the HP-GL/2 filter and can be 
exploited to cause buffer overflows with HP-GL/2 files containing overly 
large pen numbers.
      - an error within the read_rle8() and read_rle16() functions when 
parsing malformed Run Length Encoded(RLE) data within Silicon Graphics 
Image(SGI) files and can exploited to cause heap-based buffer overflow 
with a specially crafted SGI file.
      - an error within the WriteProlog() function included in the 
texttops utility and can be exploited to cause a heap-based buffer 
overflow with specially crafted file.
      Impact:
      Successful exploitation allows remote attackers to execute 
arbitrary code or compromise a vulnerable system.
      Impact Level: System
      Affected Software/OS:
      CUPS versions prior to 1.3.9
      Fix:
      Upgrade to CUPS version 1.3.9
      http://www.cups.org/software.php
      References:
      http://cups.org/articles.php?L575
      http://secunia.com/advisories/32226/
      http://www.frsirt.com/english/advisories/2008/2782/
      CVSS Score:
        CVSS Base Score     : 9.3 (AV:N/AC:M/Au:NR/C:C/I:C/A:C)
        CVSS Temporal Score : 6.9
      Risk factor: High
    CVE : CVE-2008-3639, CVE-2008-3640, CVE-2008-3641
    BID : 31681, 31688, 31690


. Vulnerability found on port ipp (631/tcp) :
      Overview: This host is running CUPS (Common UNIX Printing System) 
Service, which is prone to an Integer Overflow Vulnerabilities.
      Successful exploits may allow attackers to execute arbitrary code 
with the privileges of a user running the utilities. Failed exploit 
attempts likely cause denial-of-service conditions.
      Affected Software/OS:
      CUPS versions prior to 1.3.10
      Solution:
      Updates are available. Please see http://www.cups.org/software.php 
for more information.
      References:
       http://www.securityfocus.com/bid/34571
       http://www.cups.org/str.php?L3031
      Risk factor: High
    CVE : CVE-2009-0163
    BID : 34571


_______________________________________________
Openvas-discuss mailing list
[email protected]
http://lists.wald.intevation.org/mailman/listinfo/openvas-discuss

Reply via email to