NeXpose Release May 31, 2011

Document created by mburstein Employee on Jun 7, 2011Last modified by mburstein Employee on Nov 1, 2011
Version 5Show Document
  • View in full screen mode

Rapid72011-05-31 content and product updates
                  Release announcement


This Rapid7® NeXpose® 4.11.7 release features new and updated checks, expanded detection of security issues, and fingerprinting improvements.


These release notes document what's new in the next NeXpose release. Your NeXpose installation will automatically download and install content updates. If you have enabled NeXpose to install product updates, it will do so as well. See the third FAQ.

Upcoming release requires database migration

The recently released Next Generation Database architecture, which includes PostgreSQL 9, features significant scalability and performance improvements.

A major release scheduled for July 2011 and all releases that follow it will require the PostgreSQL 9 database to be running. If you have not yet migrated your database to PostgreSQL 9, we strongly encourage you to do so as soon possible.

To run the simple migration procedure, first download and review the  guide, Migrating the NeXpose Database. This document includes detailed instructions on how to prepare for, run, and monitor the migration. After reviewing the guide, go to the Database Migration page, which you can access by clicking the maintenance link on the Administration page of the console Web interface. You'll find a series of FAQs that guide you through preparing your environment and running the migration.

New checks | content

New potential vulnerability checks are available for Microsoft .NET flaws, including a vulnerability reported in Microsoft Security Bulletin MS11-028. This improvement requires the most recent product update.

Bi-monthly vulnerability check update | content

New vulnerability and patch checks bring coverage up to date for the following operating systems and applications:        
  • Adobe Flash
  • Adobe Reader
  • Apache
  • Apple QuickTime
  • CentOS
  • Cisco devices
  • Java Runtime Environment
  • Mozilla Firefox
  • OpenSSL
  • PHP
  • Red Hat Enterprise Linux
  • Solaris
  • VMware
These checks help prevent security breaches that could allow hostile parties to take control of affected systems, gain access to confidential data, disrupt business operations, or cause other problems.

Improvements to Solaris checks | product

Security hardening checks for Solaris are now more reliable.

Better fingerprinting | product

Fingerprinting improvements expand your ability to identify and track products running in your environment.
  • Improved fingerprinting for common SSL/TLS wrapped services includes SMTPS, IMAPS, POPS, and FTPS.
  • Scans now fingerprint Microsoft .NET Framework components.
  • Fingerprinting of NTP services is now more accurate in situations where NTP services are configured to not respond to common requests or respond in non-compliant ways.

Detection of insecure redirects | product

Web scans now detect insecure redirects in Web applications with which attackers can cause victims to visit malicious pages. For more information about this vulnerability, go to This improvement requires the most recent product update.

Detection of information disclosure through IP ID | product

Scans now detect when older assets with UDP services utilize zero in the IP identification field. Attackers can use this flaw to fingerprint the target operating systems. This improvement requires the most recent product update.


Content update

  • Update ID: 558597797

Product update

  •   Linux 32  | Update ID: 2206826321
  •   Linux 64  | Update ID: 3221767819
  •   Windows 32 | Update ID: 3389858653
  •   Windows 64 | Update ID: 2605489049


   Released on March 31, 2011 (see fourth FAQ).                           

md5sum files

Download the appropriate md5sum file to ensure that the installer was not corrupted during download:                              

Frequently asked questions (FAQs)

  • How will I know NeXpose has updated with this specific release?
    All updates are listed on the News page of the NeXpose Security Console Web interface.
  • Why doesn’t the most recent date on the News page match the dates of the current updates on the Administration page?
    You may occasionally notice that the most recent date on the News page does not match the dates of the current updates listed on the NeXpose Security Console administration page. The dates on the News page are official release dates. The dates on the console page indicate when updates were actually applied to your NeXpose installation.
  • What are content updates, and what are product updates?
    Content updates include new checks for vulnerabilities, patch verification, and compliance with security policies. Product updates include performance improvements, bug fixes, and new features in NeXpose.
  • Why are installers not updated with every release?
    To help you stay on top of an ever-growing number of security threats, Rapid7 makes the delivery of new security content timely and convenient.  After installation and first-time start-up, NeXpose continues to update itself dynamically. This makes it unnecessary for Rapid7 to update installers  with every release of security content. So, you don't have to download installers every time new content is available.
  • Does this dynamic self-updating cause NeXpose to restart?
    Yes. You may notice NeXpose taking longer to start for the first time after installation. You may also notice it restarting more than once as it completes a required sequence of updates.
  • How can I obtain more information about this release?
    If you have purchased NeXpose, contact our Technical Support Team at If you are using the Community version of NeXpose, go to
Rapid7: Recipient of Highest Ranking in Vulnerability Management
from Gartner and Forrester: