similar to: segfault - (imap|pop3)-login during nessus scan

Displaying 20 results from an estimated 200 matches similar to: "segfault - (imap|pop3)-login during nessus scan"

2006 Feb 09
1
Running nessus on freebsd...
I'm trying to get nessus setup for doing some internal security checking. I installed the ports for nessus and nessus-plugins, and everything worked as expected. I then registered for the full feed of plugins, which got me up to over 10,000 plugins. I restarted nessus, and it didn't work at all. I am running without X11, so I'm doing batch runs. I already have nmap installed, so I
2011 Feb 18
0
nessus would not compile under 8.1
hi gurus: tried to install nessus and it would not compile: ===> Configuring for nessus-libraries-2.2.9_1 ******************************************************** * W a r n i n g * * * * Nessus needs Berkeley Packet Filter (bpf). * * To use nessus, your kernel must be rebuilt with bpf, * *
2005 Aug 16
1
Nessus Installation Failure
I'm trying to get get nessus 2.2.5 to install on my centos 3.5 system. It errors out with this error: Press ENTER to continue x - Compiling the libraries x -- Configuring the sources for your system configure: error: Could not find OpenSSL and OpenSSL headers on your system **** An error occured :/ Do you want to save the compilation log to analyze what went wrong ? [y] Where should I save
2005 Dec 05
0
Good vulnerability Scanner besides Nessus?
Anyone know of a good vulnerability scanner they would recommend besides Nessus? Been googling, but a recommendation is preferred. Looking for another to run and compare the results I get with Nessus. Thanks, James
2003 Jun 23
1
Bug? High CPU Usage after nessus scan
Hi all, I think I've found a Bug in current rc2 (same occours with rc1 and 0.99.9.1). I'am running dovecot with imap, pop3 and the ssl equivalents, after a nessus scan of my host with Bruteforce checks on IMAP, imap-login eats up lots of cpu. Before the scan: dovecot 22342 0.0 0.1 2320 636 ? SN Jun18 0:00 imap-login dovecot 5841 0.0 0.1 2320 692 ? SN Jun21
2008 May 28
1
Nessus test issues with open shares
Hi, My name is Joseph Villa, I'm new to the message boards and I'm also new to Samba. I just got an e-mail back on our Nessus scans.. Here are the 2 that are relivant.. 1.) The remote host has accessible LOGS$ share. ScriptLogic creates this share to store the logs, but does not properly set the permissions on it. As a result, anyone can use it to read the remote logs. Solution:
2001 Feb 09
0
Nessus / 2.3.0p1
Hi! Our computer center is currently examining registered servers (offering services passing the firewall) using Nessus. Yesterday I had a ssh-connection closing on one host. Today I have seen serv01 155: channel 0: istate 4 != open channel 0: ostate 64 != open popping up, the connection survived however... In both cases the client host was not scanned but the server host (one was Linux, one
2003 Dec 16
3
Results of nessus scan
I run samba 2.2.8a on my openbsd 3.4 box, installed from a package. All i need is the ability to mount disks form winxp boxes so i only run smbd, at 139/tcp. I tried scanning the box with nessus, and it came up with some results that got me curious. Since i dont know very much about the smb protocol I thought i should ask here. Have searched the archives but found only old posts, concering
2013 Oct 31
7
[Bug 870] New: Iptables cannot block outbound packets sent by Nessus
https://bugzilla.netfilter.org/show_bug.cgi?id=870 Summary: Iptables cannot block outbound packets sent by Nessus Product: iptables Version: 1.4.x Platform: x86_64 OS/Version: Ubuntu Status: NEW Severity: normal Priority: P5 Component: iptables AssignedTo: netfilter-buglog at lists.netfilter.org
2002 Jul 04
1
Samba 2.2.5 - Swat Died
I upgraded this morning to 2.2.5 on both my Linux boxes (Red Hat 7.3) and now SWAT doesn't work. I have it setup to start on a reboot and I've tried force turning it off and then turning it back on. I can't even connect on the actual Linux box, let alone the Windows machines that I used to be able to connect with. I get that the connection was 'broken' for port 901. What can I
2008 Oct 16
1
rsync from tar
I use rsync to backup an application's file system state to a repository. Later if we want to refresh a test environment with the application's file state at that given point in time, we can use rsync to get the test environment into that state. Rsync works well for this purpose, but it would be nice if we could rsync to/from a tar (or other archive format) file. Since our use of rsync is
2009 Jan 15
15
NYC Puppet Meetup
Hi All, We are wanting to having a Puppet Meetup in NYC on February 3th, 2009, 6:30 PM. Place to be determined. Baring that my wife doesn''t give birth by then (which would prevent me from making it) how does this sound to everyone else? Brian G., Can you rally up the troops and also invite people from other groups? Also let''s have some specific topics to discuss.
2004 Jun 23
2
samba security question - samba vulnerable to any WindowsExploits?
Hi Ryan, I am not authenticating to any Windows server, I just have the samba server itself set up with 3 users who an login. ...Paul Ryan Frantz wrote: >Paul, > >Are you using a Windows PDC or ADS to authenticate your Samba shares? >If so, the problem would not be with Samba, but with the authenticating >server. > >Ryan > >-----Original Message----- >From:
2005 Mar 12
4
Shorewall 2.2.1 and open ports
Hello all, I’m running Shorewall 2.2.1 on linux kernel 2.6.10 with iptables 1.2.11. I recently ran a nessus scan of my firewall from a machine outside of the firewall and the nessus report told me that there are some ports open that I did not specify to be open. The ports are 32772/udp, 123/udp, 111/tcp, 32772/udp, and 53/udp. Why are these ports open when I did NOT specify them to be open
2014 Oct 04
1
LDAP NULL BASE Search Access to Samba4
Recently, i scanned my samba4.1 server by Nessus (a vulnerability scanner tool - http://www.tenable.com/products/nessus) Nessus says that Samba4 is vulnerable to "LDAP NULL BASE Search Access" as "The remote LDAP server may disclose sensitive information." Further it says that - The remote LDAP server supports search requests with a null, or empty, base object. This allows
2004 Apr 23
3
SSL Ciphers
I have dovecot running as a pop3s server on port 995 it works great with sendmail and I run nessus to check security issues nessus reports this The SSLv2 server offers 3 strong ciphers, but also 0 medium strength and 2 weak "export class" ciphers. The weak/medium ciphers may be chosen by an export-grade or badly configured client software. They only offer a limited protection against
1999 Sep 02
0
SECURITY: RHSA-1999:033 Buffer overflow problem in the inews program
-----BEGIN PGP SIGNED MESSAGE----- - --------------------------------------------------------------------- Red Hat, Inc. Security Advisory Synopsis: Buffer overflow problem in the inews program Advisory ID: RHSA-1999:033-01 Issue date: 1999-09-01 Keywords: inn inews buffer overflow - --------------------------------------------------------------------- 1. Topic: New packages for INN
2004 Jun 23
0
samba security question - samba vulnerable to any Windows Exploits?
Hi there, I'm unclear on this warning I got from NeWT when I scanned my Linux workstation. Could someone clarify for me if I should be worried? Thanks, ...Paul ------------------------ microsoft-ds (445/tcp) It was possible to log into the remote host using the following login/password combinations : 'administrator'/''
2015 Jul 08
2
Samba 4 - disabling SSLv3 to mitigate POODLE effects
Good Day All Sorry if this is a repeated email, but I need some information about how to disable SSL on a Samba4.2.2 AD domain controller as the nessus scanner is reporting the POODLE vulnerability and we are not allowed to have any of that in our environment. the nessus scan reports poodle vulnerability on all these ports: 443, 636, 3269 I had a look at previous posts but couldn't find a
2015 Apr 27
5
Centos security update
Thanks for the replies. The tool that we used for testing the security vulnerability is "Nessus". I have glibc version 2.17-78.el7, I saw that CVE-2015-0235 (Ghost) is fixed in this version and I want to apply patch for the vulnerbailities CVE-2015-1472 & CVE-2015-1473. Can you please help me in finding the right version that has fixes for these? Thanks On Sat, Apr 25, 2015 at