OpenVAS Administrator / Manager Authentication Bypass

This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.


Synopsis :

The remote host is running a security scanner management service that
is affected by an authentication bypass vulnerability.

Description :

Nessus was able to exploit an authentication bypass vulnerability by
sending the 'get_version' command. Successful exploitation of this
vulnerability could allow a remote attacker to take complete control
of an OpenVAS install.

See also :

http://www.nessus.org/u?9eda0db5
http://www.nessus.org/u?5d9463a9

Solution :

Upgrade to OpenVAS Manager 4.0.4 / 3.0.7 or higher, and OpenVAS
Administrator 1.3.2 / 1.2.2 or higher.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.5
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 70919 ()

Bugtraq ID: 63632
63634

CVE ID: CVE-2013-6765
CVE-2013-6766