I was running a Nessus scan out of BT 5R3 on my internal network and got the following high rated vuln on my Astaro (gateway interface):
I did not try to exploit this since this is my production box. I am leaving for vacation soon and do not have time to setup a test box.
Does anyone know if this is a false positive or if there is a patch? I am running version 7 - the most up to date version. If there is no patch yet, will one be coming?
I plan to go to 9 soon, but am not quite ready.
Would this show up on the external interface??
Thanks,
C68
Quote:
Synopsis: Arbitrary commands can be run on this port. Description A VxWorks WDB Debug Agent is running on this host. Using this service, it is possible to read or write any memory zone or execute arbitrary code on the host. An attacker can use this flaw to take complete control of the affected device. Solution Disable the debug agent or contact the device's vendor for a patch. Risk Factor: Critical CVSS Base Score 10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C) CVSS Temporal Score 9.5 (CVSS2#E:F/RL:U/RC:ND) Plugin Output Agent version : 2.0 MTU : 1500 Agent mode : 1 Run time type : 1 (WDB agent in VxWorks) Run time version : VxWorks5.5.1 CPU type : 41 No FP coprocessor. Target cannot write protect memory. Page size : -1 Endianness : 1234 Board support package name : DCT2500 Memory base address : -2142666752 Memory size : 2097152 CVE CVE-2010-2965 BID 42158 Xref OSVDB:66842 CERT:362332 IAVB:2010-B-0075 ICSA:10-214-01 Vulnerability Publication Date: 2010/08/02 Plugin Publication Date: 2010/08/06 Plugin Last Modification Date: 2012/08/15 Public Exploit Available: True Exploitable With: Metasploit (VxWorks WDB Agent Remote Memory Dump) |
Does anyone know if this is a false positive or if there is a patch? I am running version 7 - the most up to date version. If there is no patch yet, will one be coming?
I plan to go to 9 soon, but am not quite ready.
Would this show up on the external interface??
Thanks,
C68