Hi,

> As soon as those updates hits the feed i will do some further tests.

redone the test and now the OpenVAS results are the same as the ones from 
Nessus.
(Seems there was a problem with that new NVT)

Only one system running on port 5061/sip-tls which is vulnerable was not
detected by OpenVAS. Unfortunately i'm not allowed to give out the IP
address of this system but i have done some more tests:

1. The metasploit module is detecting this vulnerable system

2. nmap -sV -p 5016 ip shows:

5061/tcp open  tcpwrapped

but no version is shown.

3. The only informations which could be collected is:

ssl-cert: Subject: commonName=TANDBERG/organizationName=TANDBERG 
ASA/stateOrProvinceName=Askerhus/countryName=NO

Anyone knows how to collect more informations about this?
_______________________________________________
Openvas-discuss mailing list
[email protected]
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss

Reply via email to