|
|
Log in / Subscribe / Register

Security

OpenVAS replacing Nessus in Debian

By Jake Edge
August 12, 2009

For many years, the Nessus network vulnerability scanner was a tool in the toolbox of most free-software-oriented administrators. It provided a very useful, GPL-licensed scanner to detect various network vulnerabilities, misconfigurations, and other types of security problems in the network. But, starting in late 2005 that all began to change, when Nessus 3.0 switched licenses, so folks looking for a free software network scanner had to turn elsewhere.

There have been a number of attempts to fork the last GPL version of the Nessus software (2.2), but the most successful to date has been the Open Vulnerability Assessment System (or OpenVAS). The forked scanner has been making great strides to the point where Debian's Nessus maintainer, Javier Fernández-Sanguino Peña, asked that Nessus be removed from the unstable branch in favor of OpenVAS. In his message, he noted:

The main reason for this is that upstream is more focused in maintaining it's non-free version of Nessus (labeled version '3') than the free version (the 2.2.x branch). Additionally, most of the plugins (i.e. security tests) are now non-free.

There are really two parts to a vulnerability scanner, a core scanner and a set of plugins that implement network vulnerability tests (or NVTs). Much like virus scanners, NVTs are constantly being added and updated, and are available via network feeds. For a vulnerability scanner to be really usable, NVTs must be available for older vulnerabilities as well as being developed for new ones as they come along. In the thread on the debian-security mailing list, Tim Brown reports that OpenVAS has reached that point:

In specific relation to remote testing, it has almost everything the old Nessus 2 GPL feed had plus a good deal more. There are a number of plugin developers who are [focused] only on this part of the picture. I can tell you for example that there are checks that are in OpenVAS that are *not* in Nessus 3/4 for example.

AFAIK the only plugins that are in Nessus 2 but not in OpenVAS are those which Tenable have since claimed are not GPL and for these the OpenVAS team are actively developing replacements.

Where Debian goes, other distributions are likely to follow, so we may see Nessus removed in favor of OpenVAS elsewhere as well. It is unfortunate that Tenable, the company behind Nessus, was unable to find a way to continue with a GPL-licensed Nessus, but the rise of OpenVAS shows the power of code that is available under a free software license. That is not to say that Tenable did anything wrong, it was their code and thus their choice; in fact, the community should be grateful that they provided the core of a nice tool for as long as they did. But, because the GPL allows forks like OpenVAS, Nessus users still had a free software path to follow once Tenable decided to go in a different direction.

The main stumbling block to getting to this point has been the NVTs released for Nessus. Those are governed by a separate license, that made it somewhat legally dubious, at best, to use them in OpenVAS. So, the OpenVAS developers had to tackle that problem themselves. Based on Brown's message, it would seem they have gotten most of the way there, and have an active community to continue that work into the future.

Comments (1 posted)

Brief items

You Deleted Your Cookies? Think Again (Wired)

Wired looks at the use of Flash cookies implemented by Adobe's browser plugin. "Several services even use the surreptitious data storage to reinstate traditional cookies that a user deleted, which is called ‘re-spawning’ in homage to video games where zombies come back to life even after being 'killed,' the report found. So even if a user gets rid of a website’s tracking cookie, that cookie’s unique ID will be assigned back to a new cookie again using the Flash data as the 'backup.'" See also this 2008 post from Gnash developer Rob Savoye, as well as an LWN article from last October, for more information on Flash cookies.

Comments (18 posted)

New vulnerabilities

apr: arbitrary code execution

Package(s):apr CVE #(s):CVE-2009-2412
Created:August 6, 2009 Updated:May 10, 2010
Description: From the Mandriva alert: A vulnerability has been identified and corrected in apr and apr-util: Fix potential overflow in pools (apr) and rmm (apr-util), where size alignment was taking place (CVE-2009-2412).
Alerts:
SuSE SUSE-SR:2010:011 dovecot12, cacti, java-1_6_0-openjdk, irssi, tar, fuse, apache2, libmysqlclient-devel, cpio, moodle, libmikmod, libicecore, evolution-data-server, libpng/libpng-devel, libesmtp 2010-05-10
Mandriva MDVSA-2009:199-1 subversion 2009-12-07
Mandriva MDVSA-2009:314 apr 2009-12-04
Gentoo 200909-03 apr 2009-09-09
rPath rPSA-2009-0119-1 apr 2009-08-18
CentOS CESA-2009:1204 apr, apr-util 2009-08-11
CentOS CESA-2009:1205 httpd 2009-08-10
Ubuntu USN-813-2 apache2 2009-08-08
Red Hat RHSA-2009:1205-01 httpd 2009-08-10
Red Hat RHSA-2009:1204-01 apr, apr-util 2009-08-10
Ubuntu USN-813-3 apr-util 2009-08-08
Ubuntu USN-813-1 apr 2009-08-08
Mandriva MDVSA-2009:199 subversion 2009-08-08
Debian DSA-1854-1 apr 2009-08-08
Slackware SSA:2009-219-03 apr-util 2009-08-07
Slackware SSA:2009-219-02 apr 2009-08-07
Mandriva MDVSA-2009:195-1 apr 2009-08-06
Fedora FEDORA-2009-8318 apr-util 2009-08-07
Fedora FEDORA-2009-8349 apr-util 2009-08-07
Fedora FEDORA-2009-8360 apr 2009-08-07
Fedora FEDORA-2009-8336 apr 2009-08-07
Mandriva MDVSA-2009:195 apr 2009-08-06
SuSE SUSE-SA:2009:050 apache2,libapr1 2009-10-26

Comments (none posted)

camlimages: arbitrary code execution

Package(s):camlimages CVE #(s):CVE-2009-2660
Created:August 10, 2009 Updated:June 1, 2010
Description:

From the Debian advisory:

Tielei Wang discovered that CamlImages, an open source image processing library, suffers from several integer overflows which may lead to a potentially exploitable heap overflow and result in arbitrary code execution. This advisory addresses issues with the reading of JPEG and GIF Images, while DSA 1832-1 addressed the issue with PNG images.

Alerts:
Gentoo 201006-02 camlimages 2010-06-01
Debian DSA-1912-1 camlimages 2009-10-16
Debian DSA-1857-1 camlimages 2009-08-10
Debian DSA-1912-2 advi 2009-10-23
Mandriva MDVSA-2009:286 ocaml-camlimages 2009-10-21

Comments (3 posted)

fetchmail: SSL impersonation vulnerability

Package(s):fetchmail CVE #(s):CVE-2009-2666
Created:August 6, 2009 Updated:June 2, 2010
Description: From the slackware alert: This update fixes an SSL NUL prefix impersonation attack through NULs in a part of a X.509 certificate's CommonName and subjectAltName fields.
Alerts:
Gentoo 201006-12 fetchmail 2010-06-01
Mandriva MDVSA-2009:201-1 fetchmail 2009-12-04
CentOS CESA-2009:1427 fetchmail 2009-09-08
Red Hat RHSA-2009:1427-01 fetchmail 2009-09-08
Fedora FEDORA-2009-8780 fetchmail 2009-08-20
Fedora FEDORA-2009-8770 fetchmail 2009-08-20
Ubuntu USN-816-1 fetchmail 2009-08-12
Mandriva MDVSA-2009:201 fetchmail 2009-08-12
Debian DSA-1852-1 fetchmail 2009-08-07
Slackware SSA:2009-218-01 fetchmail 2009-08-06
CentOS CESA-2009:1427 fetchmail 2009-10-30

Comments (none posted)

java-1.6.0-openjdk: multiple vulnerabilities

Package(s):java-1.6.0-openjdk CVE #(s):CVE-2009-2475 CVE-2009-2476 CVE-2009-2625 CVE-2009-2670 CVE-2009-2671 CVE-2009-2672 CVE-2009-2673 CVE-2009-2674 CVE-2009-2675 CVE-2009-2689 CVE-2009-2690 CVE-2009-1896
Created:August 7, 2009 Updated:November 30, 2009
Description: From the Fedora advisory:

CVE-2009-2475 OpenJDK information leaks in mutable variables

CVE-2009-2476 OpenJDK OpenType checks can be bypassed

CVE-2009-2625 OpenJDK XML parsing Denial-Of-Service

CVE-2009-2670 OpenJDK Untrusted applet System properties access

CVE-2009-2671 CVE-2009-2672 OpenJDK Proxy mechanism information leaks

CVE-2009-2673 OpenJDK proxy mechanism allows non-authorized socket connections

CVE-2009-2674 Java Web Start Buffer JPEG processing integer overflow

CVE-2009-2675 Java Web Start Buffer unpack200 processing integer overflow

CVE-2009-2689 OpenJDK JDK13Services grants unnecessary privileges

CVE-2009-2690 OpenJDK private variable information disclosure

CVE-2009-1896 openjdk/netx grants privileges for signed jars to bundled unsigned jars

Alerts:
Mandriva MDVSA-2009:217-1 mozilla-thunderbird 2009-08-23
Mandriva MDVSA-2009:217-2 mozilla-thunderbird 2009-10-08
SuSE SUSE-SR:2009:014 dnsmasq, icu, libcurl3/libcurl2/curl/compat-curl2, Xerces-c/xerces-j2, tiff/libtiff, acroread_ja, xpdf, xemacs, mysql, squirrelmail, OpenEXR, wireshark 2009-09-01
Red Hat RHSA-2009:1236-01 java-1.5.0-ibm 2009-08-28
Mandriva MDVSA-2009:209 java-1.6.0-openjdk 2009-08-21
Ubuntu USN-814-1 openjdk-6 2009-08-11
CentOS CESA-2009:1201 java-1.6.0-openjdk 2009-08-08
SuSE SUSE-SA:2009:043 java-1_5_0-sun,java-1_6_0-sun 2009-08-07
Red Hat RHSA-2009:1201-01 java-1.6.0-openjdk 2009-08-06
Red Hat RHSA-2009:1200-01 java-1.6.0-sun 2009-08-06
Red Hat RHSA-2009:1199-01 java-1.5.0-sun 2009-08-06
Fedora FEDORA-2009-8337 java-1.6.0-openjdk 2009-08-07
Fedora FEDORA-2009-8329 java-1.6.0-openjdk 2009-08-07
SuSE SUSE-SA:2009:053 java-1_6_0-ibm 2009-11-04
SuSE SUSE-SR:2009:017 php5, newt, rubygem-actionpack, rubygem-activesupport, java-1_4_2-ibm, postgresql, samba, phpMyAdmin, viewvc 2009-10-26
Gentoo 200911-02 sun-jre-bin 2009-11-17
Red Hat RHSA-2009:1582-01 java-1.6.0-ibm 2009-11-12
SuSE SUSE-SR:2009:016 silc-toolkit, open-iscsi, strongswan,freeswan,openswan, mutt, openldap2, cyrus-imapd, java-1_6_0-openjdk, postgresql, IBMJava2-JRE/java-1_4_2-ibm, wireshark, freeradius, dovecot 2009-10-13

Comments (none posted)

libvorbis: denial of service

Package(s):libvorbis CVE #(s):CVE-2009-2663
Created:August 11, 2009 Updated:August 17, 2010
Description: From the CVE entry: libvorbis before r16182, as used in Mozilla Firefox before 3.0.13 and 3.5.x before 3.5.2 and other products, allows context-dependent attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted .ogg file.
Alerts:
SUSE SUSE-SR:2010:015 gpg2, krb5, kvirc, libpcsclite1/pcsc-lite, libpython2_6-1_0, libvorbis, libwebkit, squidGuard, strongswan 2010-08-17
SUSE SUSE-SR:2010:014 OpenOffice_org, apache2-slms, aria2, bogofilter, cifs-mount/samba, clamav, exim, ghostscript-devel, gnutls, krb5, kvirc, lftp, libpython2_6-1_0, libtiff, libvorbis, lxsession, mono-addon-bytefx-data-mysql/bytefx-data-mysql, moodle, openldap2, opera, otrs, popt, postgresql, python-mako, squidGuard, vte, w3m, xmlrpc-c, XFree86/xorg-x11, yast2-webclient 2010-08-02
openSUSE openSUSE-SU-2010:0351-1 libvorbis 2010-07-05
Gentoo 200909-02 libvorbis 2009-09-07
Ubuntu USN-825-1 libvorbis 2009-08-24
Red Hat RHSA-2009:1219-01 libvorbis 2009-08-18
CentOS CESA-2009:1219 libvorbis 2009-08-18
CentOS CESA-2009:1219 libvorbis 2009-08-19
Fedora FEDORA-2009-8445 libvorbis 2009-08-10
Fedora FEDORA-2009-8445 libvorbis 2009-08-10
SuSE SUSE-SA:2009:048 MozillaFirefox 2009-10-20
Debian DSA-1939-1 libvorbis 2009-11-24

Comments (none posted)

libxml: multiple vulnerabilities

Package(s):libxml CVE #(s):CVE-2009-2414 CVE-2009-2416
Created:August 11, 2009 Updated:September 22, 2010
Description: From the Red Hat advisory:

A stack overflow flaw was found in the way libxml processes the root XML document element definition in a DTD. A remote attacker could provide a specially-crafted XML file, which once opened by a local, unsuspecting user, would lead to denial of service (application crash). (CVE-2009-2414)

Multiple use-after-free flaws were found in the way libxml parses the Notation and Enumeration attribute types. A remote attacker could provide a specially-crafted XML file, which once opened by a local, unsuspecting user, would lead to denial of service (application crash). (CVE-2009-2416)

Alerts:
Gentoo 201009-07 libxml2 2010-09-21
Mandriva MDVSA-2009:200-1 libxml 2009-12-04
SuSE SUSE-SR:2009:015 OpenOffice_org, OpenOffice_org-math, dnsmasq, gnutls, ia32el, ib-bonding-kmp-rt/kernel-rt, libxml, opera, perl-IO-Socket-SSL, xen 2009-09-15
Fedora FEDORA-2009-8582 libxml 2009-08-15
Fedora FEDORA-2009-8594 libxml 2009-08-15
Fedora FEDORA-2009-8580 mingw32-libxml2 2009-08-15
Debian DSA-1861-1 libxml 2009-08-13
Fedora FEDORA-2009-8491 libxml2 2009-08-11
Fedora FEDORA-2009-8498 libxml2 2009-08-11
Mandriva MDVSA-2009:200 libxml 2009-08-12
Ubuntu USN-815-1 libxml2 2009-08-11
CentOS CESA-2009:1206 libxml libxml2 2009-08-10
Debian DSA-1859-1 libxml2 2009-08-10
Red Hat RHSA-2009:1206-01 libxml 2009-08-10

Comments (none posted)

mantis: database credentials leak

Package(s):mantis CVE #(s):
Created:August 10, 2009 Updated:August 12, 2009
Description:

From the Debian advisory:

It was discovered that the Debian Mantis package, a web based bug tracking system, installed the database credentials in a file with world-readable permissions onto the local filesystem. This allows local users to acquire the credentials used to control the Mantis database.

Alerts:
Debian DSA-1856-1 mantis 2009-08-08

Comments (none posted)

memcached: heap-based buffer overflow

Package(s):memcached CVE #(s):CVE-2009-2415
Created:August 7, 2009 Updated:December 11, 2009
Description: From the Debian advisory: Ronald Volgers discovered that memcached, a high-performance memory object caching system, is vulnerable to several heap-based buffer overflows due to integer conversions when parsing certain length attributes. An attacker can use this to execute arbitrary code on the system running memcached (on etch with root privileges).
Alerts:
Gentoo 201406-13 memcached 2014-06-14
Fedora FEDORA-2009-12552 memcached 2009-12-03
Mandriva MDVSA-2009:202 memcached 2009-08-14
SuSE SUSE-SR:2009:013 memcached, libtiff/libtiff3, nagios, libsndfile, gaim/finch, open-, strong, freeswan, libapr-util1, websphere-as_ce, libxml2 2009-08-11
Debian DSA-1853-1 memcached 2009-08-07

Comments (none posted)

squid3: multiple denial of service vulnerabilities

Package(s):squid3 CVE #(s):CVE-2009-2622 CVE-2009-2621
Created:August 10, 2009 Updated:August 18, 2009
Description:

From the Mandriva advisory:

Due to incorrect buffer limits and related bound checks Squid is vulnerable to a denial of service attack when processing specially crafted requests or responses (CVE-2009-2621).

Due to incorrect data validation Squid is vulnerable to a denial of service attack when processing specially crafted responses (CVE-2009-2622).

Alerts:
Gentoo 201110-24 squid 2011-10-26
Fedora FEDORA-2009-8327 squid 2009-08-07
Fedora FEDORA-2009-8324 squid 2009-08-07
Mandriva MDVSA-2009:161-1 squid 2009-08-08
Debian DSA-1843-2 squid3 2009-08-09

Comments (none posted)

subversion: heap overflows

Package(s):subversion CVE #(s):CVE-2009-2411
Created:August 7, 2009 Updated:December 8, 2009
Description: From the subversion advisory: Subversion clients and servers have multiple heap overflow issues in the parsing of binary deltas. This is related to an allocation vulnerability in the APR library used by Subversion.
Alerts:
Mandriva MDVSA-2009:199-1 subversion 2009-12-07
rPath rPSA-2009-0118-1 mod_dav_svn 2009-08-18
Gentoo 200908-05 subversion 2009-08-18
SuSE SUSE-SA:2009:044 subversion 2009-08-14
CentOS CESA-2009:1203 subversion 2009-08-11
Fedora FEDORA-2009-8449 subversion 2009-08-10
Fedora FEDORA-2009-8432 subversion 2009-08-10
Red Hat RHSA-2009:1203-01 subversion 2009-08-10
Ubuntu USN-812-1 subversion 2009-08-08
Mandriva MDVSA-2009:199 subversion 2009-08-08
Debian DSA-1855-1 subversion 2009-08-08
Slackware SSA:2009-219-01 subversion 2009-08-07

Comments (none posted)

wireshark: multiple vulnerabilities

Package(s):wireshark CVE #(s):CVE-2009-2560 CVE-2009-2562 CVE-2009-2563
Created:August 6, 2009 Updated:May 28, 2010
Description: From the National Vulnerability Database entries:

CVE-2009-2560: "Multiple unspecified vulnerabilities in Wireshark 1.2.0 allow remote attackers to cause a denial of service (crash) via unspecified vectors in the Bluetooth L2CAP, RADIUS, or MIOP dissectors."

CVE-2009-2562: "Unspecified vulnerability in the AFS dissector in Wireshark 0.9.2 through 1.2.0 allows remote attackers to cause a denial of service (crash) via unknown vectors."

CVE-2009-2563: "Unspecified vulnerability in the Infiniband dissector in Wireshark 1.0.6 through 1.2.0, when running on unspecified platforms, allows remote attackers to cause a denial of service (crash) via unknown vectors."

Alerts:
CentOS CESA-2010:0360 wireshark 2010-05-28
CentOS CESA-2010:0360 wireshark 2010-04-20
CentOS CESA-2010:0360 wireshark 2010-04-20
Red Hat RHSA-2010:0360-01 wireshark 2010-04-20
SuSE SUSE-SR:2010:007 cifs-mount/samba, compiz-fusion-plugins-main, cron, cups, ethereal/wireshark, krb5, mysql, pulseaudio, squid/squid3, viewvc 2010-03-30
Mandriva MDVSA-2010:031 wireshark 2010-02-02
SuSE SUSE-SR:2009:020 apache2-mod_jk, cacti, cups, expat, finch/pidgin, htmldoc, kdelibs3/kdelibs4, libpoppler/poppler, lighttpd, opera, perl-HTML-Parser, pyxml, seamonkey, wireshark/ethereal, xntp, zope/zope3 2010-01-12
Fedora FEDORA-2009-7998 wireshark 2009-07-24
Gentoo 200909-16 wireshark 2009-09-13
SuSE SUSE-SR:2009:014 dnsmasq, icu, libcurl3/libcurl2/curl/compat-curl2, Xerces-c/xerces-j2, tiff/libtiff, acroread_ja, xpdf, xemacs, mysql, squirrelmail, OpenEXR, wireshark 2009-09-01
Mandriva MDVSA-2009:194 wireshark 2009-08-05
Fedora FEDORA-2009-9837 wireshark 2009-09-24
Gentoo 200911-05 wireshark 2009-11-25
Debian DSA-1942-1 wireshark 2009-11-29

Comments (none posted)

wordpress: remote admin password reset

Package(s):wordpress CVE #(s):
Created:August 12, 2009 Updated:August 12, 2009
Description:

From the advisory on full-disclosure:

A web browser is sufficient to reproduce this Proof of concept: http://DOMAIN_NAME.TLD/wp-login.php?action=rp&key[]= The password will be reset without any confirmation.

An attacker could exploit this vulnerability to compromise the admin account of any wordpress/wordpress-mu <= 2.8.3

Alerts:
Fedora FEDORA-2009-8487 wordpress 2009-08-11
Fedora FEDORA-2009-8468 wordpress 2009-08-11

Comments (none posted)

Page editor: Jake Edge
Next page: Kernel development>>


Copyright © 2009, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds