The Open Vulnerability Assessment System (OpenVAS) scanner runs many network vulnerability tests (NVTs) against many target hosts and delivers the results. It uses a communication protocol to have client tools (graphical end-user or batched) connect to it, configure and execute a scan and finally receive the results for reporting. Tests are implemented in the form of plugins which need to be updated to cover recently identified security issues. The core component is a server with a set of network vulnerability tests (NVTs) to detect security problems in remote systems and applications. Additional components are: openvas-client to control the scanner, and openvas-manager and openvas-administrator to leverage OpenVAS to a comprehensive vulnerability management solution. OpenVAS is a fork of Nessus.
|Tags||Security Vulnerability Scanner|
|Operating Systems||Linux Solaris Mac OS X BSD|
|Implementation||C Other Scripting Engines|
Release Notes: This release introduces new features and a new architecture, which forms the basis for turning the vulnerability scanner into a vulnerability management solution. IPv6 support has been added. WMI clients are supported. Size limits of NVT Meta Information have been removed. Support for a number of upcoming optional extensions has been added. The OpenVAS Manager stores and organizes scans on a server in a SQL database. The OpenVAS Administrator helps with user, feed, and settings management. The Greenbone Security Assistent (GSA) allows Vulnerability Management with a Web-based interface.
Release Notes: A new architecture was introduced, where openvas-libraries now includes openvas-libnasl and redundant code from openvas-client. openvas-server was renamed to openvas-scanner and includes any platform-dependent elements of openvas-plugins. For running the scanner, only 2 modules are now required (instead of 4 as for OpenVAS 2.0). New features of OpenVAS include support for IPv6 and WMI-Clients. The new OpenVAS Manager and OpenVAS Administrator are optional extensions. This combination leverages the vulnerability scanner to a comprehensive vulnerability management solution.
Release Notes: The code audit has continued and a number of obsolete, unused, and/or unnecessary functions were identified and removed. Significant work has been done on filtering output to allow removal of false positives, etc. Translations have been updated. The Credentials Manager for Local Security Checks has been improved, and is now able to create packages that add users to the remote system (currently the following platforms are supported: RPM-based distributions, Debian-based distributions, and Microsoft Windows).
Release Notes: A Severity Override Manager has been added, including right-mouse-button actions in the report to override specific severity easily. A new "Extras" menu has been added and collects all "managers": the LSC Credentials Manager, the Severity Override Manager, and the SLAD Install Manager. A bug which caused the client to complain about missing files when starting a scan on a fresh installation has been fixed. A bug which caused OpenVAS-Client not to be placed in the correct menu on certain distributions has been fixed (which is relevant for packagers).
No changes have been submitted for this release.