Saint Scanner 6.3.4 released

SAINT, or the Security Administrator’s Integrated Network Tool, uncovers areas of weakness and recommends fixes. With SAINT® vulnerability assessment tool, you can:

  • Detect and fix possible weaknesses in your network’s security before they can be exploited by intruders.
  • Anticipate and prevent common system vulnerabilities.
  • Demonstrate compliance with current government regulations such as FISMA, Sarbanes Oxley, GLBA, HIPAA, and COPPA

New vulnerability checks in version 6.3.4:

  • Dangerous check for Windows SNMP vulnerability (Non-dangerous check already existed)
  • Trend Micro OfficeScan buffer overflows
  • ClamAV vulnerabilities
  • MadWifi vulnerabilities
  • Microsoft Word vulnerabilites
  • NetBackup Server bpcd Long Request Buffer Overflow
  • Novell Client NDPPNT.DLL buffer overflow vulnerability
  • Woltlab Burning Board cross-site scripting vulnerability
  • PHPNews cross-site scripting vulnerabilities
  • Squirrelmail cross-site scripting vulnerabilities
  • Novell ZENworks Patch Management vulnerability
  • Seditio and Land Down Under polls.php SQL injection
  • MailEnable POP vulnerability
  • Yahoo! Messenger vulnerability
  • FileZilla vulnerability
  • Netwin SurgeFTP vulnerabilities
  • Mozilla Firefox, Thunderbird and Sea Monkey vulnerabilities
  • Mantis vulnerabilities
  • ColdFusion vulnerabilities
  • MailEnable POP3 PASS buffer overflow
  • MacOSX Security Update 2006-008
  • Java Runtime Environment remote buffer overflow
  • Netscape Navigator vulnerabilities
  • Novell Netmail IMAP and NMAP vulnerabilities
  • Oracle Portal cross-site scripting vulnerability
  • nod32 vulnerability
  • Windows Workstation service temporary denial of service
  • Typo3 Remote Code Execution

New exploits in this version:

  • NetMail IMAP APPEND exploit
  • AOL ICQ ActiveX DownloadAgent exploit
  • Oracle Database MD2 component SDO_CODE_SIZE buffer overflow exploit
  • BrightStor ARCserve Backup Tape Engine RPC ReserveGroup exploit
  • MailEnable POP PASS exploit
  • BrightStor ARCserve Backup Tape Engine RPC GetGroupStatus exploit