[Oisf-users] Alerts about MS08-067
Peter Manev
petermanev at gmail.com
Tue Nov 5 11:54:51 UTC 2013
On Tue, Nov 5, 2013 at 12:42 PM, C. L. Martinez <carlopmart at gmail.com> wrote:
> Hi all,
>
> From time to time my suricata sensors (all of them using release
> 1.4.6) trigger alerts about MS08-06 vulnerability in my servers and/or
> workstations (ten or fifteen times a day).
>
> I run the following nmap script
> http://nmap.org/nsedoc/scripts/smb-check-vulns.html to check this
> vulnerability, and result is not vulnerable. For example:
>
> root at debian01:/tmp# nmap --script smb-check-vulns.nse -p445 10.15.1.2
>
> Starting Nmap 6.00 ( http://nmap.org ) at 2013-11-05 11:38 UTC
> Nmap scan report for mytest.server.local (10.15.1.2)
> Host is up (0.00049s latency).
> PORT STATE SERVICE
> 445/tcp open microsoft-ds
>
> Host script results:
> | smb-check-vulns:
> | MS08-067: NOT VULNERABLE
> | Conficker: Likely CLEAN
> | regsvc DoS: CHECK DISABLED (add '--script-args=unsafe=1' to run)
> | SMBv2 DoS (CVE-2009-3103): CHECK DISABLED (add
> '--script-args=unsafe=1' to run)
> | MS06-025: CHECK DISABLED (remove 'safe=1' argument to run)
> |_ MS07-029: CHECK DISABLED (remove 'safe=1' argument to run)
>
> Nmap done: 1 IP address (1 host up) scanned in 0.43 seconds
>
> Then, why this alert is triggered?? Any idea??
What is the sig/alert that is generated ?
Do you alert when doing the scan (if you run the scan fro the "external net") ?
--
Regards,
Peter Manev
More information about the Oisf-users
mailing list