NeXpose Release April 4, 2011

Document created by mburstein Employee on Jun 7, 2011Last modified by mburstein Employee on Nov 1, 2011
Version 3Show Document
  • View in full screen mode
                                                                   

Rapid72011-04-04 content and product updates
   Pre-release announcement

         

This Rapid7® NeXpose® 4.11.2 release features better solution information, accuracy improvements, updated checks, Web scanning improvements, expanded check coverage, and fingerprinting.

 

These release notes document what's new in the next NeXpose release. Your NeXpose installation will automatically download and install content updates. If you have enabled NeXpose to install product updates, it will do so as well. See the third FAQ.

Web scanning improvements | product
                 

          

  Several improvements provide greater security coverage and better scan performance on Web targets:

                  
  • The Web application scanner now detects insecure direct object references. As described in http://cwe.mitre.org/data/definitions/813.html, these flaws could allow authorized users to access potentially arbitrary files outside of Web applications and perform information disclosure, privilege escalation, or other attacks.
  • The Web application scanner now has broader coverage for XPATH injection vulnerabilities and improved performance due to HTTP response caching.
         

More new checks | product

           

A number of new checks expand your visibility into potential security risks in your environment:

                  
  • A check detects whether DNS servers are vulnerable to cache snooping attacks.
  • The product now fingerprints  targets that use NTP variables, and it checks for a vulnerability related to these assets.
  • A check detects a flaw in which enabled TCP timestamps leak the target host system's uptime.
  • A check detects whether assets that use Server Message Block (SMB) protocol enforce the SMB signing security mechanism.
         

These checks require the most recent product update.

         

Improved check for Server service | product
                 

           

The check for the Microsoft Server service vulnerability reported in the MS08-067 security bulletin no longer requires credentials. Additionally, this check is now safe on all versions of Windows earlier than Vista. A check is categorized as safe if there is a high degree of certainty that it will not interrupt service on a target asset.

                  

Firefox 4 fingerprinting | product
                 

           

Scans now fingerprint the recently released Firefox 4, so you can track this browser on assets in your environment.

            

Report improvement | product

           

Reports now correctly list assets that are not vulnerable for a check of Web application and e-mail certificates that are from non-trusted sources.

            

Accuracy improvements | product

           

Accuracy improvements provide better information for tracking assets, prioritizing remediation, and understanding your security posture:

                  
  • The product now correctly detects MAC addresses on OpenBSD servers.
  • A check is more accurate for Microsoft FrontPage 98 extension file name obfuscation vulnerability for systems, where the version of FrontPage could not be detected.

Better solution information | content
                 

           

Better solution information in vulnerability descriptions helps you to remediate flaws more quickly and effectively:

                  
  • Solutions for CentOS vulnerabilities now indicate that there is a delay between the time when a vulnerability is published and patched in the RedHat Source RPM Package Managers and the time that CentOS in turn rebuilds and redistributes the updated RPMs. The solutions also indicate that there may be cases where the updated RPMs listed in solutions may not exist in the CentOS RPM repositories at the time the solutions are published in the product. This information helps you to plan accordingly for remediation tasks.
  • Solution information for a vulnerability related to enabled administrative shares on Windows has been updated to be more accurate.
         

Accuracy improvements | content
                 

           

Accuracy improvements provide better information for tracking assets, prioritizing remediation, and understanding your security posture:

                  
               
  • False positives have been corrected in a check for the vulnerability in Microsoft Server Core editions of 2008 and 2008 R2, as reported in the MS10-083 security bulletin.
  •            
  • False positives have been corrected in a check for the vulnerability in Microsoft Windows 2008 and 2008 R2, as reported in MS10-024.
  •                
         

SCAP updates | content
                 

           

A regularly scheduled update of SCAP data ensures that the most current CPE and CVE identifiers and CVSS scores are available in the product. You can view SCAP update information on the SCAP page, which you can access from the Administration page in the Web interface.

                          

Bi-monthly vulnerability check update | content

          

New vulnerability and patch checks bring coverage up to date for the following operating systems and applications:

                  
  • Adobe Flash             
  • Adobe Reader        
  • Apache            
  • Apple QuickTime         
  • CentOS       
  • Cisco devices   
  • Java Runtime Environment
  • Mozilla Firefox   
  • OpenSSL         
  • PHP      
  • Red Hat Enterprise Linux     
  • Solaris      
  • VMware
  •                
          

These checks help prevent security breaches that could allow hostile parties to take control of affected systems, gain access to confidential data, disrupt business operations, or cause other problems.  

          

Frequently asked questions (FAQs)
                 

                  
  • How will I know NeXpose has updated with this specific release?
    All updates are listed on the News page of the NeXpose Security Console Web interface.
  • Why doesn’t the most recent date on the News page match the dates of the current updates on the Administration page?
    You may occasionally notice that the most recent date on the News page does not match the dates of the current updates listed on the NeXpose Security Console administration page. The dates on the News page are official release dates. The dates on the console page indicate when updates were actually applied to your NeXpose installation.
  • What are content updates, and what are product updates?
    Content updates include new checks for vulnerabilities, patch verification, and compliance with security policies. Product updates include performance improvements, bug fixes, and new features in NeXpose.
  • Why are installers not updated with every release?
    To help you stay on top of an ever-growing number of security threats, Rapid7 makes the delivery of new security content timely and convenient.  After installation and first-time start-up, NeXpose continues to update itself dynamically. This makes it unnecessary for Rapid7 to update installers  with every release of security content. So, you don't have to download installers every time new content is available.
  • Does this dynamic self-updating cause NeXpose to restart?
    Yes. You may notice NeXpose taking longer to start for the first time after installation. You may also notice it restarting more than once as it completes a required sequence of updates.
  • Where can I get more information about this release?
    Interact with the Rapid7 Community by joining our e-mail list, registering on the Wiki, and joining us on the Rapid7 IRC Channel. For more information, go to http://community.rapid7.com.
         
Rapid7: Recipient of Highest Ranking in Vulnerability Management 2010
from Gartner and Forrester:
http://www.rapid7.com/resources/gartner_marketscope.jsp
http://www.rapid7.com/resources/forrester-wave.jsp
               

Attachments

    Outcomes