Bug 849838 (CVE-2013-6765) - VUL-0: CVE-2013-6765: openvas-manager: bypass OMP authentication procedure
Summary: VUL-0: CVE-2013-6765: openvas-manager: bypass OMP authentication procedure
Status: RESOLVED FIXED
Alias: CVE-2013-6765
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other openSUSE 13.1
: P3 - Medium : Normal
Target Milestone: ---
Assignee: luce johann
QA Contact: Security Team bot
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2013-11-11 12:40 UTC by Victor Pereira
Modified: 2016-05-25 13:21 UTC (History)
7 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Victor Pereira 2013-11-11 12:40:53 UTC
CVE-2013-6765

OpenVAS Manager was found to have a security flaw which allowed an attacker to bypass the OMP authentication procedure.

The attack vector was remotely available in case OpenVAS Manager was listening on a public network interface. In case of successful attack, the attacker gained partial rights to execute OMP commands.  The bypass authentication was, however, incomplete and several OMP commands failed to execute properly.

The issue is said to be fixed in latest releases OpenVAS Manager 4.0.4 & OpenVAS Manager 3.0.7.

References:
http://seclists.org/oss-sec/2013/q4/255
http://lists.wald.intevation.org/pipermail/openvas-announce/2013-November/000157.html
https://bugzilla.redhat.com/show_bug.cgi?id=1028937
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6765
Comment 1 Swamp Workflow Management 2013-11-13 23:00:12 UTC
bugbot adjusting priority
Comment 5 luce johann 2013-12-05 15:13:47 UTC
submited packages updated to maintenance repos

regards

jluce
Comment 6 Victor Pereira 2014-01-10 10:31:27 UTC
Hi, looks like it was fixed in Factory, but not 13.1 and 12.3. Any idea when it will be done?
Comment 7 Johannes Segitz 2015-04-01 11:57:35 UTC
This is fixed in openSUSE 13.2. Can you please submit for 13.1?
Comment 9 Marcus Meissner 2016-05-25 13:21:12 UTC
13.1 is no longer in our scope.

sles12 has 4.0.4 already.

done