Hi,
Fixed the issue, updated NVT will be available in coming OpenVAS feed.
Thanks for reporting!
Regards,
Antu Sanadi
On Thursday 01 September 2016 01:17 PM, Schwarz Stefan wrote:
Helmut,
i have an open support-ticket on that issue. There was a fix on that NVT
some weeks before, but now it seems to me that this is only related to SMB
on Linux. It seems to be fixed on Windows-machines. It shouldn't be a
vulnerability at all.
Stefan
-----Ursprüngliche Nachricht-----
Von: Openvas-discuss [mailto:openvas-discuss-boun...@wald.intevation.org] Im
Auftrag von Helmut Koers
Gesendet: Donnerstag, 1. September 2016 08:58
An: openvas-discuss@wald.intevation.org
Betreff: [Openvas-discuss] SMB Brute Force Logins With Default Credentials
A recent scan shows a lot of "SMB Brute Force Logins With Default
Credentials" on a single host. The details is always "It was possible to
login with the following credentials via the SMB protocol.
<User>:<Password>" with different user/password combinations.
The related host seems to have a guest sessions with any credentials allowed
.
Is it supposed to result in multiple vulnerabilities, or shouldn't this just
result in one vulnerability?
Thanks,
Helmut
_______________________________________________
Openvas-discuss mailing list
Openvas-discuss@wald.intevation.org
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss
--
Saner Personal
A free vulnerability mitigation
software. Build strong defense.
http://www.secpod.com/saner-personal.html
_______________________________________________
Openvas-discuss mailing list
Openvas-discuss@wald.intevation.org
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss