NeXpose Release July 13, 2011

Document created by mburstein Employee on Jul 13, 2011
Version 1Show Document
  • View in full screen mode
                                                      

Rapid72011-07-13 content  updates
                  Release announcement

             

This Rapid7® NeXpose® release applies vulnerability checks for Patch Tuesday exposures and features new and updated checks.

 

These release notes document what's new in this NeXpose release. Your NeXpose installation will automatically download and install content updates. If you have enabled NeXpose to install product updates, it will do so as well. See the third FAQ.

           

Reminder: Migrate your database
                 

              

If you have not migrated yet: All upcoming releases of NeXpose will require you to perform the PostgreSQL 9 database migration. After July 1 your NeXpose installation will be ineligible to receive any content or product updates going forward. Over time, this will result in decreased accuracy and validity of your results and reporting.

             

To execute the migration, first download and review the guide Migrating the NeXpose Database. This document includes detailed instructions on how to prepare for, run, and monitor the migration.

             

After reviewing the guide, go to the Database Migration page, which you can access by clicking the maintenance link on the Administration page of the console Web interface. When you are ready to execute the migration, click the Start Migration button. Follow the migration guide for instructions throughout the process.

Vulnerability checks for July 2011 Patch Tuesday exposures | content
                 

   New  vulnerability checks provide up-to-date Microsoft Patch Tuesday scan coverage for July 2011. For information about all current security bulletins covered in this release, see the Microsoft Security Bulletin Summary for July 2011. Use the checks in this content update to verify that the latest Microsoft patches have been applied to system assets.

             

Apache Tomcat scanning improvements | content
                 

               

Names for two separate yet similar groups of Apache Tomcat vulnerabilities, CVE-2007-5333 and CVE-2007-3382/CVE-2007-3385, have been improved.

                          

Vulnerability reporting improvement | content
                 

           

An ASP.NET vulnerability now correctly appears in the Web category for more accurate reporting.

             

Adobe scanning improvements | content
                 

           

New checks provide coverage for CVE-2009-3960, an external entity vulnerability in Adobe Messaging Format. The checks also identify common configuration flaws in Adobe ColdFusion.

             

Improved scanning accuracy | content
                 

              

The following improvements to scanning accuracy provide better discovery and reporting  of vulnerabilities:

  • A false positive for CVE-2005-1921 (PHP XML-RPC code injection) on systems running HP/Compaq Service Management has been resolved.
  • A false positive for a vulnerability reported in MS07-005 has been resolved.

 

Bi-monthly vulnerability check update | content

New vulnerability and patch checks bring coverage up to date for the following operating systems and applications:   
  • Adobe Flash
  • Adobe Reader
  • Apache
  • Apple QuickTime
  • CentOS
  • Cisco devices
  • Java Runtime Environment
  • Mozilla Firefox
  • OpenSSL
  • PHP
  • Red Hat Enterprise Linux
  • Solaris
  • VMware
These checks help prevent security breaches that could allow hostile parties to take control of affected systems, gain access to confidential data, disrupt business operations, or cause other problems.                                             

Content update
                 

                  
  • Update ID: 2575222249
                

Installers
                 

   Released on July 11, 2011 (see fourth FAQ).                               

md5sum files
                 

Download the appropriate md5sum file to ensure that the installer was not corrupted during download:                                  

Frequently asked questions (FAQs)
                 

                
  • How will I know NeXpose has updated with this specific release?
    All updates are listed on the News page of the NeXpose Security Console Web interface.
  • Why doesn’t the most recent date on the News page match the dates of the current updates on the Administration page?
    You may occasionally notice that the most recent date on the News page does not match the dates of the current updates listed on the NeXpose Security Console administration page. The dates on the News page are official release dates. The dates on the console page indicate when updates were actually applied to your NeXpose installation.
  • What are content updates, and what are product updates?
    Content updates include new checks for vulnerabilities, patch verification, and compliance with security policies. Product updates include performance improvements, bug fixes, and new features in NeXpose.
  • Why are installers not updated with every release?
    To help you stay on top of an ever-growing number of security threats, Rapid7 makes the delivery of new security content timely and convenient.  After installation and first-time start-up, NeXpose continues to update itself dynamically. This makes it unnecessary for Rapid7 to update installers  with every release of security content. So, you don't have to download installers every time new content is available.
  • Does this dynamic self-updating cause NeXpose to restart?
    Yes. You may notice NeXpose taking longer to start for the first time after installation. You may also notice it restarting more than once as it completes a required sequence of updates.
  • How can I obtain more information about this release?
    If you have purchased NeXpose, contact our Technical Support Team at Support@Rapid7.com. If you are using the Community version of NeXpose, go to http://community.rapid7.com.
             
Rapid7: Recipient of Highest Ranking in Vulnerability Management
from Gartner and Forrester:
http://www.rapid7.com/resources/gartner_marketscope.jsp
http://www.rapid7.com/resources/forrester-wave.jsp
           

Attachments

    Outcomes