Summary
This host is installed with OVS Manager and is prone command injection vulnerability.
Impact
Successful exploitation will allow attacker to execute arbitrary commands with the privileges of the OVS Manager (typically root).
Solution
Apply the patch or upgrade to OVS Manager 1.0.4, 2.0.2 or later, For update refer,
http://www.openvas.org/
http://www.openvas.org/OVSA20110118.html
*****
NOTE : Ignore this warning, if above mentioned patch is already applied.
*****
Insight
The flaw is due to an input validation error in the 'email()' function in 'manage_sql.c' while processing OMP (OVS Management Protocol) requests sent by authenticated users of the GSA (Greenbone Security Assistant) web application.
Affected
OVS Manager versions prior to 1.0.4 and prior to 2.0.2
References
Severity
Classification
-
CVE CVE-2011-0018 -
CVSS Base Score: 9.0
AV:N/AC:L/Au:S/C:C/I:C/A:C
Related Vulnerabilities