TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to
[EMAIL PROTECTED]  Contact [EMAIL PROTECTED] for help with any problems!
----------------------------------------------------------------------------

Didn't ISS just recall the update for "unknown" reasons?



> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
> Mark Wood
> Sent: Thursday, January 04, 2001 9:23 AM
> To: [EMAIL PROTECTED]
> Subject: Internet Scanner 6.1 XPU 4.6 is now available
> 
> 
> 
> TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your 
> message to
> [EMAIL PROTECTED]  Contact [EMAIL PROTECTED] for help with 
> any problems!
> ------------------------------------------------------------------
> ----------
> 
> Internet Scanner 6.1
> X-Press Update 4.6
> January 4, 2001
> 
> SUMMARY
> X-Press Update 4.6 for Internet Scanner 6.1 is now 
> available for download. Internet Scanner XPU 4.6 is
> an X-Force update that delivers 43 new vulnerability
> checks, including a check for IrixTelnetdSyslogFormat
> and network sniffer checks, as well as 9 check fixes
> for SMTP checks.
> 
> This XPU is available at:
> 
>   https://www.iss.net/update/InternetScanner
> 
> The Internet Scanner User Guide and online Help contain
> instructions for installing X-Press Updates manually or
> with the automated XPU Installer.
> ________________________________________________________
> NEW VULNERABILITY CHECKS
> This X-Press Update delivers checks for a wide range of
> important vulnerabilities, from backdoors to imformation
> gathering weaknesses, on an assortment of platforms. New
> vulnerability checks in this X-Press Update are listed
> below by category.
> 
> Risk  VulnID      Check Name
> ====  ======      ==========
> 
> +Backdoors+
> High     5389 BackdoorEventHorizon
> High     5329 BackdoorHostControl
> High     5086 BackdoorQaz
> High     5362 BackdoorRemoteStorm
> High     5356 BackdoorSnidx2
> High     4789 BackdoorSwift
> High     3149 BackdoorUnexplained10
> High     2245 SubsevenBackdoor
> High     4092 WinwhatwhereInvestigator
> Low      1208 CarbonCopy32 Installed
> 
> +CGI-Bin vulnerabilities+
> High     4546 PdgsoftChangepwBo
> 
> +Daemon vulnerabilities+
> High     5092 IrixTelnetdSyslogFormat
> High     3688 SolSadmindAmslverifyBo
> Low      3455 BftelnetUsernameDos
> 
> +DNS vulnerabilities+
> Medium   3675 NtMsDnsCachepollution
> 
> +E-Mail vulnerabilities+
> High     3677 QpopperAuthBo
> High      428 Sendmail 8.7.5 Buffer Overflow
> High     3522 SmartserverPop3Bo
> High     3465 ViruswallHeloBo
> Medium   3807 NavPopUser
> Medium   1720 SLmailHeloOverflow
> Medium   3302 Smartserver3SmtpBo
> Medium   1617 Vintra mail server dos
> Medium   3488 XtramailPassDos
> 
> +Firewall vulnerabilities+
> Medium   5218 WatchguardSohoWebDos
> 
> +FTP vulnerabilities+
> Medium   3482 BrokerUserDos
> Medium   3491 QvttermLoginDos
> 
> +Information Gathering vulnerabilities+
> Low      3965 NtChroniclePresent
> Low      3966 NtCiscoscannerPresent
> Low      3969 NtHypertracePresent
> Low      3972 NtMwcRedButtonScanPresent
> Low      3981 WinShadowScanPresent
> 
> +NT Critical Issues+
> High     4603 NtAutoShareServer
> Medium   3653 NtMsDhcpLog
> Low      3949 MssqlAgentStoredPw
> 
> +NT Password Policy+
> High     4141 NtUnencryptedPwdSmb
> 
> +NT Patches+
> High     5399 NetworkMonitorBo
> 
> +Network Sniffers+
> Low      3968 NtHoppaAnalyzerPresent
> Low      3971 NtLookoutPresent
> Low      3975 NtNtSniffPresent
> Low      3979 NtSpynetPresent
> 
> +Web Scan vulnerabilities+
> Medium    925 8.3 File Creation
> Low      4558 IisStandaloneServer
> 
> Descriptions for each of these new checks can
> be found in the documentation that is downloaded
> with the XPU.
> __________________________________________________
> UPDATED CHECKS
> The following checks are also updated by Internet
> Scanner XPU 4.6:
> 
> SmtpDebug
> SmtpDecode
> SmtpExpn
> SmtpVrfy
> SmtpWizard
> SendmailAliasDos
> SendmailDaemonMode
> Sendmail875BO
> SmtpExpnBo
> SmtpHeloBo
> SmtpForgery
> SmtpRcpt
> SmtpVrfyBo
> ____________________________________________________
> FIXED ISSUES
> Internet Scanner XPU 4.6 includes a fix for the
> following issue:
> 
> Export issues in Executive Vulnerability reports:
> In some earlier versions, exporting an Executive
> Vulnerability report that  did not contain any
> vulnerabilites resulted in an exception. All Executive 
> reports have been updated to correct this issue.
> _____________________________________________________
> KNOWN ISSUES
> 
> Possible False positives on SMTP EXPN:
> It is possible to get some false positives on the SMTP
> EXPN check. According  to the RFC (821) it is considered
> acceptable for a server to respond with a  250 (success)
> or 550 (failure) when the server supports the EXPN command.
> For example, some of the servers return "550 EXPN command
> not available", meaning the command is not supported and
> the machine is not vulnerable,  while "550 That is a
> mailing list, not a user" would be a failure code, but
> not an indication of an error and the machine would be
> vulnerable. If you suspect that you have a false positive
> check your log file for the response from the server.
> 
> 


Reply via email to