NeXpose Release November 1, 2010 (Content)

Document created by techeditor on Apr 8, 2011
Version 1Show Document
  • View in full screen mode

This release is a content update.

 

  • Content updates include new checks for vulnerabilities, patch verification, and compliance with security policies.
  • Product updates include performance improvements, bug fixes, and new features.

 

New checks for QuickTime


  • New vulnerability checks expand security coverage for the popular Apple QuickTime multimedia platform.

 

Remote check for two similar vulnerabilities on Windows XP and Windows 2003


  • A safe, remote check for the MS06-040 vulnerability now also flags the MS08-067 vulnerability on Windows XP and Windows 2003 targets. These two critical vulnerabilities are similar in terms of security risks. Both allow attackers to execute remote code. If a scanned asset is found to be vulnerabile to MS06-040, it is likely to be vulnerable to the more recent and highly exploitable MS08-067. This check allows you to flag both vulnerabilities without credentials.

 

Bi-monthly vulnerability check update


  • New vulnerability and patch checks bring coverage up to date for the following operating systems and applications:
    o Adobe Flash
    o Adobe Reader
    o Apache
    o Apple QuickTime
    o CentOS
    o Cisco devices
    o Mozilla Firefox
    o OpenSSL
    o PHP
    o Red Hat Enterprise Linux
    o Solaris
    o VMware
    These checks help prevent security breaches that could allow hostile parties to take control of affected systems, gain access to confidential data, disrupt business operations, or cause other problems.

 

Vulnerability checks


  • CESA-2010:0768: java-1.6.0-openjdk security and bug fix update
  • JRE Vulnerability: CVE-2010-3550
  • JRE Vulnerability: CVE-2010-3552
  • JRE Vulnerability: CVE-2010-3553
  • JRE Vulnerability: CVE-2010-3554
  • JRE Vulnerability: CVE-2010-3555
  • JRE Vulnerability: CVE-2010-3556
  • JRE Vulnerability: CVE-2010-3558
  • JRE Vulnerability: CVE-2010-3559
  • JRE Vulnerability: CVE-2010-3562
  • JRE Vulnerability: CVE-2010-3563
  • JRE Vulnerability: CVE-2010-3565
  • JRE Vulnerability: CVE-2010-3566
  • JRE Vulnerability: CVE-2010-3567
  • JRE Vulnerability: CVE-2010-3568
  • JRE Vulnerability: CVE-2010-3569
  • JRE Vulnerability: CVE-2010-3571
  • JRE Vulnerability: CVE-2010-3572
  • MFSA2010-64: Miscellaneous memory safety hazards (rv:1.9.2.11/ 1.9.1.14)
  • MFSA2010-64: Miscellaneous memory safety hazards (rv:1.9.2.11/ 1.9.1.14)
  • MFSA2010-64: Miscellaneous memory safety hazards (rv:1.9.2.11/ 1.9.1.14)
  • MFSA2010-65: Buffer overflow and memory corruption using document.write
  • MFSA2010-66: Use-after-free error in nsBarProp
  • MFSA2010-67: Dangling pointer vulnerability in LookupGetterOrSetter
  • MFSA2010-73: Heap buffer overflow mixing document.write and DOM insertion
  • Obsolete Version of Apple QuickTime
  • RHSA-2010:0768: java-1.6.0-openjdk security and bug fix update
  • RHSA-2010:0770: java-1.6.0-sun security update
  • RHSA-2010:0786: java-1.4.2-ibm security update
  • APSB09-10: Flash Player ATL Vulnerability
  • CESA-2010:0780: thunderbird security update
  • CESA-2010:0781: seamonkey security update
  • CESA-2010:0782: firefox security update
  • QuickTime: arbitrary code execution or denial of service via malicious BMP images (CVE-2010-0536)
  • QuickTime: arbitrary code execution or denial of service via malicious color tables (CVE-2010-0528)
  • QuickTime: arbitrary code execution via malicious FlashPix files (CVE-2009-2798)
  • QuickTime: arbitrary code execution via malicious H.264 movie files (CVE-2009-2202)
  • QuickTime: arbitrary code execution via malicious images description atoms (CVE-2009-0955)
  • QuickTime: arbitrary code execution via malicious JP2 images (CVE-2009-0957)
  • QuickTime: arbitrary code execution via malicious MPEG-4 video files (CVE-2009-2203)
  • QuickTime: arbitrary code execution via zero-sized user atom data in movie files (CVE-2009-0956)
  • QuickTime: buffer overflow allows arbitrary code execution via malicious MP3 files (CVE-2009-0004)
  • QuickTime: buffer overflow allows arbitrary code execution via malicious, long responses to RTSP requests (CVE-2008-0234)
  • QuickTime: denial of service and arbitrary code execution via malicious H.263 files (CVE-2009-0005)
  • QuickTime: heap corruption allows arbitrary code execution via malicious H.264 movie files (CVE-2008-3627)
  • QuickTime: heap overflow allows arbitrary code execution via malicious AVI files (CVE-2009-0003)
  • QuickTime: heap overflow allows arbitrary code execution via malicious Cinepak files (CVE-2009-0006)
  • QuickTime: heap overflow allows arbitrary code execution via malicious CTAB data in movie files (CVE-2007-4677)
  • QuickTime: heap overflow allows arbitrary code execution via malicious H.264 MOV files (CVE-2007-2295)
  • QuickTime: heap overflow allows arbitrary code execution via malicious H.264 movie files (CVE-2009-2799)
  • QuickTime: heap overflow allows arbitrary code execution via malicious movie files (CVE-2009-0954)
  • QuickTime: heap overflow allows arbitrary code execution via malicious MS ADPCM encoded audio data in AVI files (CVE-2009-0185)
  • QuickTime: heap overflow allows arbitrary code execution via malicious PICT images (CVE-2007-4676)
  • QuickTime: heap overflow allows arbitrary code execution via malicious PICT images (CVE-2009-0953)
  • QuickTime: heap overflow allows arbitrary code execution via malicious QTVR files (CVE-2009-0002)
  • QuickTime: heap overflow allows arbitrary code execution via malicious QTVR movie files (CVE-2007-4675)
  • QuickTime: heap overflow allows arbitrary code execution via malicious QuickTime movie files (CVE-2009-0007)
  • QuickTime: heap overflow allows arbitrary code execution via malicious RTSP URLs (CVE-2009-0001)
  • QuickTime: heap overflow allows arbitrary code execution via malicious STSD atoms in movie files (CVE-2007-3750)
  • QuickTime: heap overflow allows arbitrary code execution via STSD sizes in malicious QuickTime movie files (CVE-2007-0754)
  • QuickTime: heap overflow allows arbitrary code exeuction via malicious MIDI files (CVE-2007-0712)
  • QuickTime: heap-based buffer overflow in QuickTime.qts via malicious PICT images (CVE-2010-0529)
  • QuickTime: incorrect permissions handling allows arbitrary code execution via malicious Java applets (CVE-2007-2397)
  • QuickTime: integer overflow allows arbitrary code execution via malicious 3GP video files (CVE-2007-0711)
  • QuickTime: integer overflow allows arbitrary code execution via malicious M4V/MP4 files (CVE-2007-2296)
  • QuickTime: integer overflow allows arbitrary code execution via malicious PICT images (CVE-2010-0527)
  • QuickTime: integer overflow allows arbitrary code execution via malicious QuickTime movies files with larger UDTA atoms (CVE-2007-0714)
  • QuickTime: integer overflow allows arbitrary code execution via malicious SMIL files (CVE-2007-2394)
  • QuickTime: invalid pointer handling allows arbitrary code execution via malicious PICT images (CVE-2008-3628)
  • QuickTime: JDirect support exposes dangerous interfaces which allow arbitrary code execution via malicious Java applets (CVE-2007-2396)
  • QuickTime: memory corruption allows arbitrary code execution (CVE-2007-2392)
  • QuickTime: memory corruption allows arbitrary code execution via malicious movile files with invliate IDSC atom sizes (CVE-2008-0033)
  • QuickTime: QTPlugin.ocx arbitrary code execution via the _Marshaled_pUnk attribute (CVE-2010-1818)
  • QuickTime: security controls bypass allows arbitrary code execution via malicious Java applets (CVE-2007-2393)
  • QuickTime: stack overflow allows arbitrary code execution via malicious movie files with third-party Indeo v3.2 codecs (CVE-2008-3635)
  • QuickTime: stack overflow allows arbitrary code execution via malicious QTVR files with crafted panorama PDAT atoms (CVE-2008-3625)
  • QuickTime: stack-based buffer overlow allows arbitrary code execution via malicious movie files (CVE-2010-1799)
  • QuickTime: unspecified vulnerability allows arbitrary code execution via malicious Java applets (CVE-2007-3751)
  • QuickTime: unspecified vulnerability allows arbitrary code execution via malicious movie files (CVE-2007-2395)
  • QuickTime: use of uninitialized memory allows arbitrary code execution via malicious movie files with third-party Indeo v5 codecs (CVE-2008-3615)
  • RHSA-2010:0780: thunderbird security update
  • RHSA-2010:0781: seamonkey security update
  • RHSA-2010:0782: firefox security update
  • JRE Vulnerability: CVE-2010-3561
  • JRE Vulnerability: CVE-2010-3570
  • MFSA2010-72: Insecure Diffie-Hellman key exchange
  • QuickTime: QuickTime java extensions (QTJava.dll) allows arbitrary code execution (CVE-2007-2175)
  • QuickTime: stack overflow allows arbitrary code execution via malicious PICT images (CVE-2007-4672)
  • CESA-2010:0785: quagga security update
  • JRE Vulnerability: CVE-2010-1321
  • JRE Vulnerability: CVE-2010-3549
  • JRE Vulnerability: CVE-2010-3557
  • MFSA2010-71: Unsafe library loading vulnerabilities
  • MFSA2010-71: Unsafe library loading vulnerabilities
  • QuickTime: arbitrary code execution via malicious .3g2 movie files with H.263 encoding (CVE-2010-0062)
  • QuickTime: arbitrary code execution via malicious audio files with QDM2 encoding (CVE-2010-0059)
  • QuickTime: arbitrary code execution via malicious audio files with QDMC encoding (CVE-2010-0060)
  • QuickTime: arbitrary code execution via malicious movie files with H.261 encoding (CVE-2010-0514)
  • QuickTime: arbitrary code execution via malicious movie files with H.264 encoding (CVE-2010-0515)
  • QuickTime: arbitrary code execution via malicious movie files with M-JPEG encoding (CVE-2010-0517)
  • QuickTime: arbitrary code execution via malicious movie files with RLE encoding (CVE-2010-0516)
  • QuickTime: arbitrary code execution via malicious movie files with Sorenson encoding (CVE-2010-0518)
  • QuickTime: buffer overflow allows arbitrary code execution via malicious, compressed PICT images (CVE-2008-0036)
  • QuickTime: buffer overflow in reference atom handling allows arbitrary code execution via malicious movies (CVE-2008-1015)
  • QuickTime: cross-zone scripting allows arbitrary code execution via malicious MOV files (CVE-2007-0059)
  • QuickTime: heap overflow allows arbitrary code execution via maliciosu PICT images (CVE-2008-1583)
  • QuickTime: heap overflow allows arbitrary code execution via malicious movies with RLE (CVE-2008-1021)
  • QuickTime: heap overflow allows arbitrary code execution via malicious MP4A movies (CVE-2008-1018)
  • QuickTime: heap overflow allows arbitrary code execution via malicious PICT files (CVE-2008-1019)
  • QuickTime: heap overflow allows arbitrary code execution via malicious PICT files (CVE-2008-1020)
  • QuickTime: heap overflow allows arbitrary code execution via malicious PICT images (CVE-2009-2837)
  • QuickTime: heap overflow allows arbitrary code execution via malicious PICT images with crafted PixData structures (CVE-2008-1581)
  • QuickTime: heap overflow allows arbitrary code execution via malicious QTVR files with crafted panorama atoms (CVE-2008-3624)
  • QuickTime: heap overflow in clip opcode parsing allows arbitrary code execution via malicious PICT files (CVE-2008-1023)
  • QuickTime: heap overflow in clipping region atom handling allows arbitrary code execution via malicious movie files (CVE-2008-1017)
  • QuickTime: heap-based buffer overlow in QuickTimeAuthoriing.qtx allows arbitrary code execution via malicious FLC files (CVE-2010-0520)
  • QuickTime: improper handling of movie media tracks allows arbitrary code execution via malicious movie files (CVE-2008-1016)
  • QuickTime: improper handling of unrecognized URIs allows arbitrary code execution via malicious file URLS (CVE-2008-1585)
  • QuickTime: integer overflow allows arbitrary code execution via heap corruption in malicious PICT images (CVE-2008-3614)
  • QuickTime: integer overflow allows arbitrary code exeuction via malicious FlashPix images (CVE-2010-0519)
  • QuickTime: memory corruption allows arbitrary code execution via malicious ftyp atoms in movie files (CVE-2008-1739)
  • QuickTime: QTJava objects can be unserialized by untrused java applets, allow arbitrary code execution (CVE-2008-1013)
  • QuickTime: stack overflow allows arbitrary code execution via malicious movie files with crafted Indeo video codec content (CVE-2008-1584)
  • QuickTime: stack overflow allows arbitrary code execution via malicious movie files with large atoms (CVE-2007-4674)
  • QuickTime: stack overflow allows arbitrary code execution via malicious VR files with zero-length obji atoms (CVE-2008-1022)
  • QuickTime: unspecified overflow allows arbitrary code execution via malicious movie files with large STSZ atoms (CVE-2008-3626)
  • QuickTime: unspecified vulnerability allows arbitrary code execution via malicious AAC-encoded files (CVE-2008-1582)
  • RHSA-2010:0758: kernel-rt security and bug fix update
  • RHSA-2010:0785: quagga security update
  • JRE Vulnerability: CVE-2009-3555
  • JRE Vulnerability: CVE-2010-3541
  • JRE Vulnerability: CVE-2010-3573
  • JRE Vulnerability: CVE-2010-3574
  • MFSA2010-69: Cross-site information disclosure via modal calls
  • QuickTime: heap corruption allows arbitrary code execution via malicious movie files with modified Macintosh resource records (CVE-2008-0032)
  • QuickTime: heap overflow allows arbitrary code execution via malicious PICT files (CVE-2007-0715)
  • QuickTime: heap overflow allows arbitrary code execution via malicious QTIF files (CVE-2007-0718)
  • QuickTime: heap overflow allows arbitrary code execution via malicious QuickTime movie files (CVE-2007-0713)
  • QuickTime: integer overflow allows arbitrary code execution via malicious QTIF files (CVE-2007-0717)
  • QuickTime: memory corruption allows arbitrary code execution via malicious Sorenson 3 video files (CVE-2008-0031)
  • QuickTime: stack overflow allows arbitrary code execution via malicious QTIF files (CVE-2007-0716)
  • Apache httpd apr_bridage_split_line DoS (CVE-2010-1623)
  • Apache httpd apr_bridage_split_line DoS (CVE-2010-1623)
  • Apache httpd expat DoS (CVE-2009-3560)
  • Apache httpd expat DoS (CVE-2009-3560)
  • Apache httpd expat DoS (CVE-2009-3720)
  • Apache httpd expat DoS (CVE-2009-3720)
  • Apache httpd mod_dav DoS (CVE-2010-1452)
  • CESA-2010:0749: poppler security update
  • CESA-2010:0750: xpdf security update
  • CESA-2010:0751: xpdf security update
  • CESA-2010:0752: gpdf security update
  • CESA-2010:0753: kdegraphics security update
  • CESA-2010:0754: cups security update
  • CESA-2010:0779: kernel security and bug fix update
  • CESA-2010:0787: glibc security update
  • CESA-2010:0788: pidgin security update
  • JRE Vulnerability: CVE-2010-3548
  • JRE Vulnerability: CVE-2010-3551
  • MFSA2010-68: XSS in gopher parser when parsing hrefs
  • MFSA2010-70: SSL wildcard certificate matching IP addresses
  • QuickTime: XSS and other attacks malicious QTL files with embedded XML elements (CVE-2006-4965)
  • RHSA-2010:0749: poppler security update
  • RHSA-2010:0750: xpdf security update
  • RHSA-2010:0751: xpdf security update
  • RHSA-2010:0752: gpdf security update
  • RHSA-2010:0753: kdegraphics security update
  • RHSA-2010:0754: cups security update
  • RHSA-2010:0771: kernel-rt security and bug fix update
  • RHSA-2010:0773: Red Hat Enterprise MRG Messaging and Grid Version 1.3
  • RHSA-2010:0774: Red Hat Enterprise MRG Messaging and Grid Version 1.3
  • RHSA-2010:0775: cobbler security update
  • RHSA-2010:0779: kernel security and bug fix update
  • RHSA-2010:0787: glibc security update
  • RHSA-2010:0788: pidgin security update
  • Sun Patch: SunOS 5.10: ftp and in.ftpd patch
  • Sun Patch: SunOS 5.10: gssd mech_krb5.so.1 kadmind patch
  • Sun Patch: SunOS 5.10: su patch
  • Sun Patch: SunOS 5.10_x86: ftp and in.ftpd patch
  • Sun Patch: SunOS 5.10_x86: gssd mech_krb5.so.1 kadmind patch
  • Sun Patch: SunOS 5.10_x86: su patch
  • Sun Patch: SunOS 5.9: su patch
  • Sun Patch: SunOS 5.9_x86: su Patch
  • CESA-2010:0755: cups security update
  • QuickTime: DLL hijacking allows arbitrary code execution (CVE-2010-1819)
  • QuickTime: heap based buffer overflow allows arbitrary code execution via malicious genl atoms (CVE-2010-0526)
  • QuickTime: heap overflow allows arbitrary code execution via malicious PICT images (CVE-2008-2319)
  • QuickTime: improper handling of external URLs in movies allows sensitive information disclosure (CVE-2008-1014)
  • QuickTime: insufficient access control allows sensitive information disclosure via malicious Java applets (CVE-2007-2402)
  • QuickTime: out-of-bounds read allows arbitrary code execution via malicious PICT images (CVE-2008-3629)
  • RHSA-2010:0755: cups security update
  • RHSA-2010:0756: Red Hat Enterprise MRG Messaging security and bug fix update 1.2.2
  • RHSA-2010:0757: Red Hat Enterprise MRG Messaging security and bug fix update 1.2.2
  • JRE Vulnerability: CVE-2010-3560

Attachments

    Outcomes