Displaying 20 results from an estimated 1000 matches similar to: "Nessus Installation Failure"
2006 Feb 09
1
Running nessus on freebsd...
I'm trying to get nessus setup for doing some internal security
checking. I installed the ports for nessus and nessus-plugins,
and everything worked as expected. I then registered for the
full feed of plugins, which got me up to over 10,000 plugins.
I restarted nessus, and it didn't work at all. I am running
without X11, so I'm doing batch runs. I already have nmap
installed, so I
2003 Dec 16
3
Results of nessus scan
I run samba 2.2.8a on my openbsd 3.4 box, installed from a package.
All i need is the ability to mount disks form winxp boxes so i only run
smbd, at 139/tcp.
I tried scanning the box with nessus, and it came up with some results
that got me curious.
Since i dont know very much about the smb protocol I thought i should
ask here.
Have searched the archives but found only old posts, concering
2010 Feb 19
2
segfault - (imap|pop3)-login during nessus scan
We've been struggling with a problem for the past couple of days which to this point I've only gotten to be able to boil down to this:
1. Install nessus home edition (less pluggins I assume)
2. run all scans (sequentially or in parallel, doesn't seem to matter)
3. about 3 minutes in /var/log/messages will show segfaults on imap and/or pop3
imap-login[22185]: segfault at
2003 Jun 23
1
Bug? High CPU Usage after nessus scan
Hi all,
I think I've found a Bug in current rc2 (same occours with rc1 and
0.99.9.1).
I'am running dovecot with imap, pop3 and the ssl equivalents, after a
nessus scan of my host with Bruteforce checks on IMAP, imap-login eats
up lots of cpu.
Before the scan:
dovecot 22342 0.0 0.1 2320 636 ? SN Jun18 0:00 imap-login
dovecot 5841 0.0 0.1 2320 692 ? SN Jun21
2013 Oct 31
7
[Bug 870] New: Iptables cannot block outbound packets sent by Nessus
https://bugzilla.netfilter.org/show_bug.cgi?id=870
Summary: Iptables cannot block outbound packets sent by Nessus
Product: iptables
Version: 1.4.x
Platform: x86_64
OS/Version: Ubuntu
Status: NEW
Severity: normal
Priority: P5
Component: iptables
AssignedTo: netfilter-buglog at lists.netfilter.org
2008 May 28
1
Nessus test issues with open shares
Hi,
My name is Joseph Villa, I'm new to the message boards and I'm also new to
Samba. I just got an e-mail back on our Nessus scans.. Here are the 2 that
are relivant..
1.) The remote host has accessible LOGS$ share.
ScriptLogic creates this share to store the logs, but does not properly
set the permissions on it. As a result, anyone
can use it to read the remote logs.
Solution:
2011 Feb 18
0
nessus would not compile under 8.1
hi gurus:
tried to install nessus and it would not compile:
===> Configuring for nessus-libraries-2.2.9_1
********************************************************
* W a r n i n g *
* *
* Nessus needs Berkeley Packet Filter (bpf). *
* To use nessus, your kernel must be rebuilt with bpf, *
*
2005 Dec 05
0
Good vulnerability Scanner besides Nessus?
Anyone know of a good vulnerability scanner they would recommend besides
Nessus? Been googling, but a recommendation is preferred. Looking for
another to run and compare the results I get with Nessus.
Thanks,
James
2004 Jun 23
2
samba security question - samba vulnerable to any WindowsExploits?
Hi Ryan,
I am not authenticating to any Windows server, I just have the samba
server itself set up with 3 users who an login.
...Paul
Ryan Frantz wrote:
>Paul,
>
>Are you using a Windows PDC or ADS to authenticate your Samba shares?
>If so, the problem would not be with Samba, but with the authenticating
>server.
>
>Ryan
>
>-----Original Message-----
>From:
2014 Oct 04
1
LDAP NULL BASE Search Access to Samba4
Recently, i scanned my samba4.1 server by Nessus (a vulnerability scanner
tool - http://www.tenable.com/products/nessus)
Nessus says that Samba4 is vulnerable to "LDAP NULL BASE Search Access" as
"The remote LDAP server may disclose sensitive information."
Further it says that - The remote LDAP server supports search requests with
a null, or empty, base object. This allows
2014 Oct 10
1
fixes for quota support on NetBSD
Hi!
dovecot-2.2.13 already has quota support for NetBSD, but it's buggy.
The attached patches by Manuel Bouyer <bouyer at NetBSD.org> fix the
issues.
There is one thing that's not nice in them: one include is now for
"/usr/include/quota.h" since dovecot comes with its own file "quota.h"
which is earlier in the search path. Perhaps dovecot's copy can be
2005 Mar 12
4
Shorewall 2.2.1 and open ports
Hello all,
I’m running Shorewall 2.2.1 on linux kernel 2.6.10 with iptables 1.2.11. I recently ran a nessus scan of my firewall from a machine outside of the firewall and the nessus report told me that there are some ports open that I did not specify to be open. The ports are 32772/udp, 123/udp, 111/tcp, 32772/udp, and 53/udp. Why are these ports open when I did NOT specify them to be open
2004 Apr 23
3
SSL Ciphers
I have dovecot running as a pop3s server on port 995
it works great with sendmail
and
I run nessus to check security issues
nessus reports this
The SSLv2 server offers 3 strong ciphers, but also
0 medium strength and 2 weak "export class" ciphers.
The weak/medium ciphers may be chosen by an export-grade
or badly configured client software. They only offer a
limited protection against
2001 Feb 09
0
Nessus / 2.3.0p1
Hi!
Our computer center is currently examining registered servers (offering
services passing the firewall) using Nessus.
Yesterday I had a ssh-connection closing on one host. Today I have seen
serv01 155: channel 0: istate 4 != open
channel 0: ostate 64 != open
popping up, the connection survived however...
In both cases the client host was not scanned but the server host (one was
Linux, one
2010 Jan 22
2
Stata and R user GLM method
Hello people,
I am in the process of migrating from Stata to R and I would like to check
if my results are similar under the two softwares:
Here is my GLM command under R
nurse.model<-glm(pQSfteHT~dQSvacrateHTQuali3_2 + dQSvacrateHTQuali3_3 +
dQSvacrateHTQuali3_4 + dQSvacrateHTQuali3_5 + cluster_32 + cluster_33 +
cluster_34 ,family=binomial(link = "logit"))
and below the stata
2009 Mar 27
2
Installing openmpi & lam for use with R
I am trying to install the R package "Rmpi" which needs libmpi. I've
installed openmpi and lam in Centos 5.2:
[root at rab45-1 /]# rpm -qv openmpi
openmpi-1.2.5-5.el5
openmpi-1.2.5-5.el5
[root at rab45-1 /]# rpm -qv lam
lam-7.1.2-14.el5
lam-7.1.2-14.el5
But I get the following error message when trying to install Rmpi:
/usr/bin/ld: skipping incompatible /usr/lib/lam/lib/libmpi.so
2015 Jul 08
2
Samba 4 - disabling SSLv3 to mitigate POODLE effects
Good Day All
Sorry if this is a repeated email, but I need some information about how to
disable SSL on a Samba4.2.2 AD domain controller as the nessus scanner is
reporting the POODLE vulnerability and we are not allowed to have any of
that in our environment.
the nessus scan reports poodle vulnerability on all these ports:
443, 636, 3269
I had a look at previous posts but couldn't find a
2003 Oct 04
1
Security Fix Confusion
Hi,
I'm wondering if anybody could enlighten me about the effect of tracking
RELENG?
When the Openssh advisory came out (SA-03:12) I allowed a few days for all
issues to get ironed out and then used CVSUP to rebuild my boxes with
RELENG_4_7 or RELENG_4_8 (as appropriate). The advisory says that the
problem with OpenSSH is fixed by 4.7-RELEASE-p16 and a 'uname -a' of one of
my 4.7
2004 Mar 07
1
3.0.2a: SID, User Enumeration
I'm runninng samba 3.0.2a on a few machines, ADS security mode, domain
member roles. I throw nessus at it, and it can fetch the SID and then
list all of the users on the system.
I view this as a security problem, is there a way to prevent this?
2013 Aug 06
2
Openssl vulnerability - SSL/ TLS Renegotion Handshakes
Hi,
I'm currently at CentOS 5.8. I'm using openssl version
openssl-0.9.8e-22.el5. The following vulnerability was reported by a Nessus
security scan:
"SSL/ TLS Renegotion Handshakes MiTm Plaintext Data Injection"
As per following link, Redhat has introduced openssl-0.9.8m which fixes
this specific issue: