Saint Scanner Version 6.5.3 released
SAINT, or the Security Administrator’s Integrated Network Tool, uncovers areas of weakness and recommends fixes. With SAINT® vulnerability assessment tool, you can:
- Detect and fix possible weaknesses in your network’s security before they can be exploited by intruders.
- Anticipate and prevent common system vulnerabilities.
- Demonstrate compliance with current government regulations such as FISMA, Sarbanes Oxley, GLBA, HIPAA, and COPP
New vulnerability checks in version 6.5.3:
- Opera vulnerability
- Mozilla Firefox status bar spoofing vulnerability
- DirectX DirectTransform FlashPix ActiveX buffer overflow
- HP-UX ldcconn buffer overflow
- Adobe Flash Player ActionScript Security information gathering vulnerability
- MediaWiki cross-site scripting vulnerability
- tcpdump vulnerability
- Asterisk vulnerabilities
- Mercury Mail SMTP CRAM-MD5 buffer overflow
- Yahoo Messenger Video Conferencing vulnerability
- Lenovo Access Support acpRunner ActiveX multiple vulnerabilities
- rsyncd vulnerability
- SurgeMail IMAP Search buffer overflow
- Wingate SMTP remote code execution
- Altiris Deployment Solution privilege elevation
- DB2 vulnerabilities fixed by DB2 UDB 8 FP15 and DB2 9.1 FP3
- phpMyAdmin cross-site scripting vulnerabilities
- Trend Micro Server Protect vulnerabilities
- Cisco VPN Client privilege elevation
- Helix Server and Helix DNA Server RTSP require header remote command execution vulnerability
- MSN Messenger video conversation heap overflow
- Legato Networker remote exec service stack overflow vulnerabilities
- BIND version 8 weak query identifiers vulnerability
New exploits in this version:
- HP OpenView Operations OVTrace exploit
- Internet Explorer ActiveX IObjectsafety exploit
- Trend Micro ServerProtect RPC exploit
- Linux support to Snort DCE/RPC exploit
- Snort Back Orifice Pre-Processor exploit
Post scriptum
Compliance Mandates
|
Related Articles
Network Discovery |
|
Saint |
|
Vulnerability Scanner |
|