Saint Scanner updated to 6.4.2

SAINT, or the Security Administrator’s Integrated Network Tool, uncovers areas of weakness and recommends fixes. With SAINT® vulnerability assessment tool, you can:

  • Detect and fix possible weaknesses in your network’s security before they can be exploited by intruders.
  • Anticipate and prevent common system vulnerabilities.
  • Demonstrate compliance with current government regulations such as FISMA, Sarbanes Oxley, GLBA, HIPAA, and COPPA

New vulnerability checks in version 6.4.2:

  • PHProjekt vulnerabilities
  • MySQL denial of service vulnerability
  • Woltlab Burning Board SQL injection
  • Horde Framework vulnerabilities
  • Horde IMP vulnerabilities
  • WordPress vulnerabilities
  • Internet Explorer 7 cross-site scripting vulnerability
  • libwpd vulnerabilities
  • Helix Server
  • MERCUR IMAPD buffer overflow
  • ARCserve Backup Tape Engine RPC vulnerability
  • Windows Mail for Vista
  • Squid Proxy Trace Request denial of service vulnerability
  • Microsoft Windows WPAD request interception vulnerability
  • Windows IE WPAD Protocol Implementation Arbitrary Proxy Registration
  • Konqueror vulnerabilities
  • SQL-Ledger/LedgerSMB vulnerability
  • Mozilla Firefox vulnerability
  • Lotus Domino IMAP CRAM-MD5 Authentication Buffer Overflow
  • PHP vulnerabilities (Month of PHP vulnerabilities)
  • Zope vulnerabilities
  • OpenOffice vulnerabilities
  • Asterisk vulnerability
  • Evolution vulnerability
  • Multiple GDI vulnerabilities (MS07-017)
  • ARCserve Backup Media Server SUN-RPC Procedure 191 Code Execution

New exploits in this version:

  • Mercury Mail Transport System IMAP buffer overflow exploit
  • ePolicy Orchestrator SiteManager ActiveX exploit
  • MERCUR imapd SUBSCRIBE exploit.
  • System V login buffer overflow exploit
  • MERCUR imapd NTLMSSP exploit

Post scriptum