TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to
[EMAIL PROTECTED]  Contact [EMAIL PROTECTED] for help with any problems!
----------------------------------------------------------------------------

Internet Scanner 6.1
X-Press Update 4.6
January 4, 2001

SUMMARY
X-Press Update 4.6 for Internet Scanner 6.1 is now 
available for download. Internet Scanner XPU 4.6 is
an X-Force update that delivers 43 new vulnerability
checks, including a check for IrixTelnetdSyslogFormat
and network sniffer checks, as well as 9 check fixes
for SMTP checks.

This XPU is available at:

  https://www.iss.net/update/InternetScanner

The Internet Scanner User Guide and online Help contain
instructions for installing X-Press Updates manually or
with the automated XPU Installer.
________________________________________________________
NEW VULNERABILITY CHECKS
This X-Press Update delivers checks for a wide range of
important vulnerabilities, from backdoors to imformation
gathering weaknesses, on an assortment of platforms. New
vulnerability checks in this X-Press Update are listed
below by category.

Risk    VulnID      Check Name
====    ======      ==========

+Backdoors+
High     5389   BackdoorEventHorizon
High     5329   BackdoorHostControl
High     5086   BackdoorQaz
High     5362   BackdoorRemoteStorm
High     5356   BackdoorSnidx2
High     4789   BackdoorSwift
High     3149   BackdoorUnexplained10
High     2245   SubsevenBackdoor
High     4092   WinwhatwhereInvestigator
Low      1208   CarbonCopy32 Installed

+CGI-Bin vulnerabilities+
High     4546   PdgsoftChangepwBo

+Daemon vulnerabilities+
High     5092   IrixTelnetdSyslogFormat
High     3688   SolSadmindAmslverifyBo
Low      3455   BftelnetUsernameDos

+DNS vulnerabilities+
Medium   3675   NtMsDnsCachepollution

+E-Mail vulnerabilities+
High     3677   QpopperAuthBo
High      428   Sendmail 8.7.5 Buffer Overflow
High     3522   SmartserverPop3Bo
High     3465   ViruswallHeloBo
Medium   3807   NavPopUser
Medium   1720   SLmailHeloOverflow
Medium   3302   Smartserver3SmtpBo
Medium   1617   Vintra mail server dos
Medium   3488   XtramailPassDos

+Firewall vulnerabilities+
Medium   5218   WatchguardSohoWebDos

+FTP vulnerabilities+
Medium   3482   BrokerUserDos
Medium   3491   QvttermLoginDos

+Information Gathering vulnerabilities+
Low      3965   NtChroniclePresent
Low      3966   NtCiscoscannerPresent
Low      3969   NtHypertracePresent
Low      3972   NtMwcRedButtonScanPresent
Low      3981   WinShadowScanPresent

+NT Critical Issues+
High     4603   NtAutoShareServer
Medium   3653   NtMsDhcpLog
Low      3949   MssqlAgentStoredPw

+NT Password Policy+
High     4141   NtUnencryptedPwdSmb

+NT Patches+
High     5399   NetworkMonitorBo

+Network Sniffers+
Low      3968   NtHoppaAnalyzerPresent
Low      3971   NtLookoutPresent
Low      3975   NtNtSniffPresent
Low      3979   NtSpynetPresent

+Web Scan vulnerabilities+
Medium    925   8.3 File Creation
Low      4558   IisStandaloneServer

Descriptions for each of these new checks can
be found in the documentation that is downloaded
with the XPU.
__________________________________________________
UPDATED CHECKS
The following checks are also updated by Internet
Scanner XPU 4.6:

SmtpDebug
SmtpDecode
SmtpExpn
SmtpVrfy
SmtpWizard
SendmailAliasDos
SendmailDaemonMode
Sendmail875BO
SmtpExpnBo
SmtpHeloBo
SmtpForgery
SmtpRcpt
SmtpVrfyBo
____________________________________________________
FIXED ISSUES
Internet Scanner XPU 4.6 includes a fix for the
following issue:

Export issues in Executive Vulnerability reports:
In some earlier versions, exporting an Executive
Vulnerability report that  did not contain any
vulnerabilites resulted in an exception. All Executive 
reports have been updated to correct this issue.
_____________________________________________________
KNOWN ISSUES

Possible False positives on SMTP EXPN:
It is possible to get some false positives on the SMTP
EXPN check. According  to the RFC (821) it is considered
acceptable for a server to respond with a  250 (success)
or 550 (failure) when the server supports the EXPN command.
For example, some of the servers return "550 EXPN command
not available", meaning the command is not supported and
the machine is not vulnerable,  while "550 That is a
mailing list, not a user" would be a failure code, but
not an indication of an error and the machine would be
vulnerable. If you suspect that you have a false positive
check your log file for the response from the server.



Reply via email to