Nmap Development mailing list archives

Scan OpenSSL Heartbleed Vulnerability using namp


From: Wesley Yee Kok Choon <wesley.yee () cimb com>
Date: Wed, 16 Apr 2014 12:03:22 +0800

Dear all, 

We are using using nmap to scan OpenSSL Heartbleed Vulnerability in our 
servers. 

There has been reports on a few cases from FS-ISAC (
https://www.fsisac.com/) that McAfee Vulnerability Manager (Foundstone) 
scan script for the OpenSSL HeartBleed has caused  a large number of HP 
iLO cards to become unresponsive. HP does not appear to have released any 
information regarding this issue.   

May I know if nmap has the issue to scan HP servers that has HP iLo card? 

Thanks and Regards,

Wesley Yee 
 
******************************************************************************************************************************************************
Privileged/confidential information may be contained in this message. If this message is received by anyone other than 
the intended addressee, please return the message to the sender by replying to it and then delete the message from your 
computer.  Unintended recipients are prohibited from taking action on the basis of information in this e-mail. No 
confidentiality or privilege is waived or lost by CIMB Group including its affiliates (CIMB Group) by any 
mistransmission of this e-mail. CIMB Group does not accept responsibility or liability for the accuracy or completeness 
of, or presence of any virus or disabling code in, this e-mail. CIMB Group reserves the right to monitor e-mail 
communications through its networks (in accordance with applicable laws). Opinions, conclusions, statements and other 
information in this message that do not relate to the official business of CIMB Group shall be understood as neither 
given nor endorsed by it. 

CIMB Group Sdn Bhd (incorporated in Malaysia, (Company  No: 706803-D)). Registered Office: 17th Floor, Menara CIMB,  
Jalan Stesen Sentral 2, Kuala Lumpur Sentral, 50470 Kuala Lumpur, Malaysia. 
Visit our website at www.cimb.com
******************************************************************************************************************************************************
_______________________________________________
Sent through the dev mailing list
http://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/


Current thread: