Saint vulnerability scanner updated to v6.7.8

SAINT is the Security Administrator’s Integrated Network Tool. It is used to non-intrusively detect security vulnerabilities on any remote target, including servers, workstations, networking devices, and other types of nodes. It will also gather information such as operating system types and open ports. The SAINT graphical user interface provides access to SAINT’s data management, scan configuration, scan scheduling, and data analysis capabilities through a web browser. Different aspects of the scan results are presented in hyperlinked HTML pages, and reports on complete scan results can be generated and saved

New in version 6.7.8:

  • Nessus script ID field available for SAINTwriter

New vulnerability checks in version 6.7.8:

  • Firefox, SeaMonkey and Thunderbird vulnerability
  • AOL ICQ vulnerability
  • Safari vulnerability
  • April 2008 Oracle vulnerabilities
  • CFEngine vulnerabilitues
  • Flash vulnerabilities
  • Avast
  • TIBCO Rendezvous
  • ICMP timestamp request and netmask request information disclosure
  • Internet Explorer 8 Beta vulnerabilities
    - Symantec Autofix support tool vulnerability
  • CA ARCservice Backup for Laptops and Desktops Server and CA Management Suite vulnerabilities
  • SmarterMail denial of service vulnerability
  • LANDesk TFTP vulnerability
  • HP OpenView Network Node Manager ovw.dll Message Handling Buffer Overflow
  • Interbase buffer overflow vulnerability
  • HP OpenView NNM ovalarm service buffer overflow
  • OpenOffice vulnerability
  • ClamAV vulnerabilities
  • VLC vulnerabilities
  • rsyncd vulnerabilities
  • OpenOffice vulnerabilities
  • Python vulnerabilities
  • CUPS vulnerability
  • Squid
  • Borland StarTeam HTTP handling buffer overflow
  • CA Alert Notification Service RPC Request buffer overflows

New exploits in this version:

  • Windows GDI EMF filename exploit
  • HP Openview Network Node Manager HTTP exploit
  • HP Openview Network Node Manager ovalarmsrv exploit
  • Borland InterBase ibserver.exe exploit
  • CA Alert Notification Server exploit
  • Borland StarTeam Multicast Service exploit

Post scriptum

Compliance Mandates

  • Penetration testing & Ethical Hacking :

    PCI DSS 11.3, SOX A13.3, GLBA 16 CFR Part 314.4 (c), HIPAA 164.308(a)(8), FISMA RA-5, SI-2, ISO 27001/27002 12.6, 15.2.2

  • Vulnerability Scanner :

    PCI DSS 11.2, 6.6, SOX A13.3, GLBA 16CFR Part 314.4(c), HIPAA 164.308(a)(8), FISMA RA-5, SI-2, ISO 27001-27002 12.6, 15.2.2


Related Articles

Penetration testing & Ethical Hacking
Saint
Vulnerability Scanner