bitsadmin / wesng

Windows Exploit Suggester - Next Generation
BSD 3-Clause "New" or "Revised" License
4.24k stars 571 forks source link

Not identifying x86 platform #39

Closed meir555 closed 4 years ago

meir555 commented 5 years ago

systeminfo.txt

Host Name:                 #####
OS Name:                   Microsoft(R) Windows(R) Server 2003, Standard Edition
OS Version:                5.2.3790 Service Pack 1 Build 3790
OS Manufacturer:           Microsoft Corporation
OS Configuration:          Standalone Server
OS Build Type:             Uniprocessor Free
Registered Owner:          #####
Registered Organization:   
Product ID:                ####-###-########-#####
Original Install Date:     2/17/2008, 7:42:18 PM
System Up Time:            4 Days, 14 Hours, 25 Minutes, 24 Seconds
System Manufacturer:       VMware, Inc.
System Model:              VMware Virtual Platform
System Type:               X86-based PC
Processor(s):              1 Processor(s) Installed.
                           [01]: x86 Family 6 Model 63 Stepping 2 GenuineIntel ~2597 Mhz
BIOS Version:              INTEL  - 6040000
Windows Directory:         C:\WINDOWS
System Directory:          C:\WINDOWS\system32
Boot Device:               \Device\HarddiskVolume1
System Locale:             en-us;English (United States)
Input Locale:              en-us;English (United States)
Time Zone:                 (GMT-06:00) Central Time (US & Canada)
Total Physical Memory:     511 MB
Available Physical Memory: 334 MB
Page File: Max Size:       678 MB
Page File: Available:      525 MB
Page File: In Use:         153 MB
Page File Location(s):     C:\pagefile.sys
Domain:                    WORKGROUP
Logon Server:              N/A
Hotfix(s):                 1 Hotfix(s) Installed.
                           [01]: Q147222
Network Card(s):           N/A

python wes.py systeminfo.txt -e

Windows Exploit Suggester 0.98 ( https://github.com/bitsadmin/wesng/ )
[+] Parsing systeminfo output
[+] Operating System
    - Name: Microsoft Windows Server 2003
    - Generation: 2003
    - Build: 3790
    - Version: None
    - Architecture: 
    - Installed hotfixes: None
[+] Loading definitions
    - Creation date of definitions: 20191204
[+] Determining missing patches
[+] Filtering duplicate vulnerabilities
[+] Applying display filters
[+] Found vulnerabilities

wes is not identifying this is x68 architecture and I get also lots of exploits for x64

bitsadmin commented 4 years ago

Thanks @meir555 for your report! I wouldn't be surprised if this is because of incomplete data from the various feeds that are being combined. For that reason I will close your report for now. If you think this is a bug in wes-ng instead, feel free to reopen this issue.