OpenVAS Manager 3.0 before 3.0.7 and 4.0 before 4.0.4 allows remote attackers to bypass the OMP authentication restrictions and execute OMP commands via a crafted OMP request for version information, which causes the state to be set to CLIENT_AUTHENTIC, as demonstrated by the omp_xml_handle_end_element function in omp.c.
| Date Added | Due Date | Vulnerability Name | Required Action |
|---|---|---|---|
| N/A |
| Type | Version | Base score | Base severity | Vector |
|---|---|---|---|---|
| Primary | 2.0 | 7.5 | HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
| Hyperlink | Source | Resource |
|---|---|---|
| http://lists.wald.intevation.org/pipermail/openvas-announce/2013-November/000157.html | cve@mitre.org | Vendor Advisory |
| http://www.openvas.org/OVSA20131108.html | cve@mitre.org | N/A |
| http://www.openwall.com/lists/oss-security/2013/11/10/2 | cve@mitre.org | N/A |
| http://lists.wald.intevation.org/pipermail/openvas-announce/2013-November/000157.html | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |
| http://www.openvas.org/OVSA20131108.html | af854a3a-2127-422b-91ae-364da2661108 | N/A |
| http://www.openwall.com/lists/oss-security/2013/11/10/2 | af854a3a-2127-422b-91ae-364da2661108 | N/A |