[unisog] RE: New RPC Vulnerability -> SCANMS false positive
thomasj4 at ohio.edu
Thu Sep 11 18:45:59 GMT 2003
-----BEGIN PGP SIGNED MESSAGE-----
To detect the new RPC vulnerabilities, we're currently testing Nessus
We're using the standalone interpretor 'nasl' utility to run just plugin
So far we haven't encountered any false positives. Anyone already have any
data regarding false positives/negatives for this plugin?
- --On Wednesday, September 10, 2003 6:51 PM -0400 Steve Bernard
<sbernard at gmu.edu> wrote:
> FYI, after applying the new RPC patches (MS03-039), ISS's 'scanms.exe'
> tool flags hosts as being vulnerable to the previous RPC vulnerability
> (MS03-036). I haven't seen an updated version of 'scanms' yet. The new
> signatures from E-Eye seem to work well.
-----BEGIN PGP SIGNATURE-----
Version: Mulberry PGP Plugin v2.0
Comment: processed by Mulberry PGP Plugin
-----END PGP SIGNATURE-----
More information about the unisog