Nexpose Release November 9, 2011

Document created by mburstein Employee on Nov 9, 2011
Version 1Show Document
  • View in full screen mode

Rapid72011-11-09 product and content updates
                  Release announcement


This Rapid7® Nexpose® release applies checks for Patch Tuesday exposures, features new and updated vulnerability checks, and improvements to fingerprinting, accuracy, and scanning.
These release notes document what's new in this Nexpose release. Your Nexpose installation will automatically download and install content updates. If you have enabled Nexpose to install product updates, it will do so as well. See the third FAQ.

Accuracy improvements | product


An update for SMTP fingerprinting has been added to include support for Microsoft 2008 and 2008 R2. This provides more precise detection and reporting of vulnerability results to help you prioritize remediation efforts more effectively.


Fingerprinting improvements | product


Fingerprinting improvements help you track assets better, provide a more comprehensive software inventory, and deliver more accurate information on vulnerabilities that affect your organization.

  • Microsoft .NET fingerprinting is now more accurate.
  • Adobe Flash player now fingerprints correctly when Windows Management Instrumentation (WMI) service is disabled.
  • When only Windows Management Instrumentation (WMI) service is available, Microsoft Office components are now accurately fingerprinted.

Coverage improvements | product


New vulnerability checks provide better security coverage.

  • A vulnerability check for GRUB passwords on Linux hosts has been improved to return more accurate results.
  • A check for CVE-1999-0210 has been improved to only run against Solaris assets.

November 2011 Patch Tuesday checks | content

New vulnerability checks provide up-to-date Microsoft Patch Tuesday scan coverage for November 2011. For information about all current security bulletins covered in this release, see the Microsoft Security Bulletin Summary for November 2011. Use the checks in this update to verify that the latest Microsoft patches have been applied to system assets.

Accuracy improvements | content


A false negative for CVE-2002-0651 on BIND 8.3.0 through 8.3.1 has been resolved. This provides more precise detection and reporting of vulnerability results to help you prioritize remediation efforts more effectively.

Coverage improvements | content


New vulnerability checks provide better security coverage.

  • New vulnerability checks for Microsoft Office 2007 SP3 have been added.
  • Vulnerability detection has been added to determine whether or not an asset has been exploited by the Duqu trojan.
  • A new vulnerability check has been added to determine if an asset can be exploited by the Duqu trojan.
  • Several legacy, duplicate vulnerability checks for Adobe Reader have been removed, resulting in more accurate risk scores for systems running the affected software.
  • The checks for vulnerabilities reported in the Microsoft Security Bulletin MS11-006 have been improved.

List of new checks table improvement | content

The List of new checks table on the News page now correctly displays the current list of available checks.


Bi-monthly vulnerability check update | content


New vulnerability and patch checks bring coverage up to date for the following operating systems and applications:

  • Adobe Flash
  • Adobe Reader
  • Adobe Shockwave
  • Apache
  • Apple QuickTime
  • BIND
  • CentOS
  • Cisco devices
  • Java Runtime Environment
  • Mozilla Firefox
  • OpenSSL
  • PHP
  • Red Hat Enterprise Linux
  • Solaris
  • VMware

These checks help prevent security breaches that could allow hostile parties to take control of affected systems, gain access to confidential data, disrupt business operations, or cause other problems.


Product update

  •   Linux 32                      | Update ID: 361352775
  •   Linux 64                      | Update ID:  352814484
  •   Windows 32                     | Update ID:      1639020219
  •   Windows 64                     | Update ID:      22325517

Content update

  • Update ID:  853064840


   Released on August 1, 2011 (see fourth FAQ).                               

md5sum files

Download the appropriate md5sum file to ensure that the installer was not corrupted during download:                                   

Frequently asked questions (FAQs)

  • How will I know Nexpose has updated with this specific release?
    All updates are listed on the News page of the Nexpose Security Console Web interface.
  • Why doesn’t the most recent date on the News page match the dates of the current updates on the Administration page?
    You may occasionally notice that the most recent date on the News page does not match the dates of the current updates listed on the Nexpose Security Console administration page. The dates on the News page are official release dates. The dates on the console page indicate when updates were actually applied to your Nexpose installation.
  • What are content updates, and what are product updates?
    Content updates include new checks for vulnerabilities, patch verification, and compliance with security policies. Product updates include performance improvements, bug fixes, and new features in Nexpose.
  • Why are installers not updated with every release?
    To help you stay on top of an ever-growing number of security threats, Rapid7 makes the delivery of new security content timely and convenient.  After installation and first-time start-up, Nexpose continues to update itself dynamically. This makes it unnecessary for Rapid7 to update installers  with every release of security content. So, you don't have to download installers every time new content is available.
  • Does this dynamic self-updating cause Nexpose to restart?
    Yes. You may notice Nexpose taking longer to start for the first time after installation. You may also notice it restarting more than once as it completes a required sequence of updates.
  • How can I obtain more information about this release?
    If you have purchased Nexpose, contact our Technical Support Team at If you are using the Community version of Nexpose, go to
Rapid7: Recipient of Highest Ranking in Vulnerability Management
from Gartner and Forrester: