First published: Mon May 19 2014(Updated: )
OpenVAS Administrator 1.2 before 1.2.2 and 1.3 before 1.3.2 allows remote attackers to bypass the OAP authentication restrictions and execute OAP commands via a crafted OAP request for version information, which causes the state to be set to CLIENT_AUTHENTIC.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenVAS | =1.2-rc1 | |
OpenVAS | =1.2.0 | |
OpenVAS | =1.2.1 | |
OpenVAS | =1.3-beta1 | |
OpenVAS | =1.3-rc1 | |
OpenVAS | =1.3.0 | |
OpenVAS | =1.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6766 is considered a high severity vulnerability due to its ability to allow remote attackers to bypass authentication and execute commands.
To fix CVE-2013-6766, upgrade OpenVAS Administrator to version 1.2.2 or 1.3.2 or later.
CVE-2013-6766 affects OpenVAS Administrator versions 1.2-rc1, 1.2.0, 1.2.1, 1.3-beta1, 1.3-rc1, 1.3.0, and 1.3.1.
CVE-2013-6766 allows remote attackers to bypass authentication restrictions and execute arbitrary commands.
Yes, CVE-2013-6766 is a known vulnerability that has been publicly documented and acknowledged in security advisories.