NeXpose Release February 9, 2011

Document created by mburstein Employee on Jun 7, 2011Last modified by mburstein Employee on Nov 1, 2011
Version 2Show Document
  • View in full screen mode
                                                                  

Rapid72011-02-09 content update
   Pre-release announcement

           

This Rapid7® NeXpose® release applies vulnerability checks for Patch Tuesday exposures.

 

These release notes document what's new in the next NeXpose release. Your NeXpose installation will automatically download and install content updates. If you have enabled NeXpose to install product updates, it will do so as well. See the third FAQ.

           

Vulnerability checks for February 2011 Patch Tuesday exposures
                 

                 
  • New NeXpose vulnerability checks provide up-to-date Microsoft Patch Tuesday scan coverage for February 2011. These include checks for the following flaws reported in Microsoft Security Bulletins:                    
    • Four Internet Explorer vulnerabilities could allow remote code execution if a user views a maliciously crafted Web page. The severity rating depends on the version of Internet Explorer. See MS11-003 for details.
    • A vulnerability in Windows Shell graphics processor could allow remote code execution if a user views a maliciously crafted thumbnail image. This vulnerability is rated  critical for all Microsoft-supported editions of Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. See MS11-006) for details.
    • A vulnerability in Windows OpenType Compact Font Format (CFF) driver could allow remote code execution if a user views content rendered in a maliciously crafted CFF font. This vulnerability is rated critical for all Microsoft-supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. See MS11-007) for details.
    For information about all current security bulletins covered in this release, see the Microsoft Security Bulletin Summary for February 2011. Use the checks in this content update to verify that the latest Microsoft patches have been applied to system assets.                        

            

Frequently asked questions (FAQs)
                 

                 
  • How will I know NeXpose has updated with this specific release?
    All updates are listed in NeXpose under the News tab.
  • How will I know NeXpose has updated with this specific release?
    All updates are listed in NeXpose under the News tab.
  • Why doesn’t the most recent date on the News page match the dates of the current updates on the Administration page?
    You may occasionally notice that the most recent date on the News page does not match the dates of the current updates listed on the NeXpose Security Console administration page. The dates on the News page are official release dates. The dates on the console page indicate when updates were actually applied to your NeXpose installation.
  • What are content updates, and what are product updates?
    Content updates include new checks for vulnerabilities, patch verification, and compliance with security policies. Product updates include performance improvements, bug fixes, and new features in NeXpose.
  • Why are installers not updated with every release?
    To help you stay on top of an ever-growing number of security threats, Rapid7 makes the delivery of new security content timely and convenient.  After installation and first-time start-up, NeXpose continues to update itself dynamically. This makes it unnecessary for Rapid7 to update installers  as frequently as we release new security content. So, you don't have to download installers every time new content is available.
  • Does this dynamic self-updating cause NeXpose to restart?
    Yes. You may notice NeXpose taking longer to start up the first time after installation. You may also notice it restarting more than once as it completes a required sequence of updates.
  • Where can I get more information about this release?
    Interact with the Rapid7 Community by joining our e-mail list, registering on the Wiki, and joining us on the Rapid7 IRC Channel. For more information, go to http://community.rapid7.com.
           
Rapid7: Recipient of Highest Ranking in Vulnerability Management 2010
from Gartner and Forrester:
http://www.rapid7.com/resources/gartner_marketscope.jsp
http://www.rapid7.com/resources/forrester-wave.jsp
               

Attachments

    Outcomes