Hide Forgot
OpenVAS Manager was found to have a security flaw which allowed an attacker to bypass the OMP authentication procedure. The attack vector was remotely available in case OpenVAS Manager was listening on a public network interface. In case of successful attack, the attacker gained partial rights to execute OMP commands. The bypass authentication was, however, incomplete and several OMP commands failed to execute properly. The issue is said to be fixed in latest releases OpenVAS Manager 4.0.4 & OpenVAS Manager 3.0.7. References: http://seclists.org/oss-sec/2013/q4/255 http://lists.wald.intevation.org/pipermail/openvas-announce/2013-November/000157.html
Created openvas-manager tracking bugs for this issue: Affects: fedora-all [bug 1028939]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.