On 18 January 2012 20:06,  <bsekle...@fedex.com> wrote:
> For PCI compliance scanners, one is probably better off obfuscating the
> version string by adding:
>
>        ServerTokens Prod
>
> ...and then, if the scanner is half a loaf, it will attempt to exploit any
> known CVEs independent of the discovered version string.

I deal with PCI Scans regularly. Very very very few of them will
attempt to exploit anything. What they will do is attempt to detect
the version of the program running on that port and spew out every
single CVE that affects it. If you hide your version, they tend to
spew out even more irrelevant CVE numbers for every possible version
it could be.

Your best defence is to look each vulnerability up in
http://www.redhat.com/security/data/cve/, post the links, request they
are marked as False Positives and then slap in the link explaining
backporting as well in the orlorn hope it will educate them. IIt still
amazes me though - I work for a top tier hosting company. If I make
the statement "this is a fully patched RHEL 5.6 EUS OS, all
outstanding patches have been addressed", I'm not making it up and
still several PCI Scan Vendors want to argue the point with me for
every single scan.

And as far as I remember, the PCI DSS standard says that you need to
install all vendor patches within a certain time scale. I don't
believe it says that you need to patch every CVE immediately - PCI
Scans are a licence to install a copy of Nessus and print money.

-- 
Sam

_______________________________________________
rhelv5-list mailing list
rhelv5-list@redhat.com
https://www.redhat.com/mailman/listinfo/rhelv5-list

Reply via email to