Executive Summary
Summary | |
---|---|
Title | HIDDEN COBRA â North Koreaâs DDoS Botnet Infrastructure |
Informations | |||
---|---|---|---|
Name | TA17-164A | First vendor Publication | 2017-06-13 |
Vendor | US-CERT | Last vendor Modification | 2017-08-23 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). This alert provides technical details on the tools and infrastructure used by cyber actors of the North Korean government to target the media, aerospace, financial, and critical infrastructure sectors in the United States and globally. Working with U.S. Government partners, DHS and FBI identified Internet Protocol (IP) addresses associated with a malware variant, known as DeltaCharlie, used to manage North Koreas distributed denial-of-service (DDoS) botnet infrastructure. This alert contains indicators of compromise (IOCs), malware descriptions, network signatures, and host-based rules to help network defenders detect activity conducted by the North Korean government. The U.S. Government refers to the malicious cyber activity by the North Korean government as HIDDEN COBRA. For more information related to HIDDEN COBRA activity, go to https://www.us-cert.gov/hiddencobra. If users or administrators detect the custom tools indicative of HIDDEN COBRA, these tools should be immediately flagged, reported to the DHS National Cybersecurity Communications and Integration Center (NCCIC) or the FBI Cyber Watch (CyWatch), and given highest priority for enhanced mitigation. This alert identifies IP addresses linked to systems infected with DeltaCharlie malware and provides descriptions of the malware and associated malware signatures. DHS and FBI are distributing these IP addresses to enable network defense activities and reduce exposure to the DDoS command-and-control network. FBI has high confidence that HIDDEN COBRA actors are using the IP addresses for further network exploitation. This alert includes technical indicators related to specific North Korean government cyber operations and provides suggested response actions to those indicators, recommended mitigation techniques, and information on reporting incidents to the U.S. Government. For a downloadable copy of IOCs, see: * IOCs (.csv [ https://www.us-cert.gov/sites/default/files/publications/TA-17-164A_csv.csv ]) On August 23, 2017, DHS published a Malware Analysis Report (MAR-10132963) that examines malware functionality to provide detailed code analysis and insight into specific tactics, techniques, and procedures (TTPs) observed in the malware. For a downloadable copy of the MAR, see: * MAR (.pdf [ https://www.us-cert.gov/sites/default/files/publications/MAR-10132963.pdf ]) Description Since 2009, HIDDEN COBRA actors have leveraged their capabilities to target and compromise a range of victims; some intrusions have resulted in the exfiltration of data while others have been disruptive in nature. Commercial reporting has referred to this activity as Lazarus Group[1] [ https://exchange.xforce.ibmcloud.com/collection/Actor-Lazarus-Group-0bf5e50d24445f94d6b2d744dc6c63a2 ] and Guardians of Peace.[2] [ https://www.alienvault.com/blogs/labs-research/operation-blockbuster-unveils-the-actors-behind-the-sony-attacks ] DHS and FBI assess that HIDDEN COBRA actors will continue to use cyber operations to advance their governments military and strategic objectives. Cyber analysts are encouraged to review the information provided in this alert to detect signs of malicious network activity. Tools and capabilities used by HIDDEN COBRA actors include DDoS botnets, keyloggers, remote access tools (RATs), and wiper malware. Variants of malware and tools used by HIDDEN COBRA actors include Destover,[3] [ https://www.symantec.com/connect/blogs/destover-destructive-malware-has-links-attacks-south-korea ] Wild Positron/Duuzer,[4] [ https://www.symantec.com/connect/blogs/duuzer-back-door-trojan-targets-south-korea-take-over-computers ] and Hangman.[5] [ https://www.fireeye.com/blog/threat-research/2015/09/zero-day_hwp_exploit.html ] DHS has previously released Alert TA14-353A,[6] [ https://www.us-cert.gov/ncas/alerts/TA14-353A ] which contains additional details on the use of a server message block (SMB) worm tool employed by these actors. Further research is needed to understand the full breadth of this groups cyber capabilities. In particular, DHS recommends that more research should be conducted on the North Korean cyber activity that has been reported by cybersecurity and threat research firms. HIDDEN COBRA actors commonly target systems running older, unsupported versions of Microsoft operating systems. The multiple vulnerabilities in these older systems provide cyber actors many targets for exploitation. These actors have also used Adobe Flash player vulnerabilities to gain initial entry into users environments. HIDDEN COBRA is known to use vulnerabilities affecting various applications. These vulnerabilities include: * CVE-2015-6585: Hangul Word Processor Vulnerability DHS recommends that organizations upgrade these applications to the latest version and patch level. If Adobe Flash or Microsoft Silverlight is no longer required, DHS recommends that those applications be removed from systems. The IOCs provided with this alert include IP addresses determined to be part of the HIDDEN COBRA botnet infrastructure, identified as DeltaCharlie. The DeltaCharlie DDoS bot was originally reported by Novetta in their 2016 Operation Blockbuster Malware Report.[7] [ https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Destructive-Malware-Report.pdf ] This malware has used the IP addresses identified in the accompanying .csv and .stix files as both source and destination IPs. In some instances, the malware may have been present on victims networks for a significant period. *"Technical Details"* DeltaCharlie is a DDoS tool used by HIDDEN COBRA actors, and is referenced and detailed in Novettas Operation Blockbuster Destructive Malware report. The information related to DeltaCharlie from the Operation Blockbuster Destructive Malware report should be viewed in conjunction with the IP addresses listed in the .csv and .stix files provided within this alert. DeltaCharlie is a DDoS tool capable of launching Domain Name System (DNS) attacks, Network Time Protocol (NTP) attacks, and Carrier Grade NAT (CGN) attacks. The malware operates on victims systems as a svchost-based service and is capable of downloading executables, changing its own configuration, updating its own binaries, terminating its own processes, and activating and terminating denial-of-service attacks. Further details on the malware can be found in Novettas report available at the following URL: https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Destructive-Malware-Report.pdf *"Detection and Response"* HIDDEN COBRA IOCs related to DeltaCharlie are provided within the accompanying .csv and .stix files of this alert. DHS and FBI recommend that network administrators review the IP addresses, file hashes, network signatures, and YARA rules provided, and add the IPs to their watchlist to determine whether malicious activity has been observed within their organization. When reviewing network perimeter logs for the IP addresses, organizations may find numerous instances of these IP addresses attempting to connect to their systems. Upon reviewing the traffic from these IP addresses, system owners may find that some traffic corresponds to malicious activity and some to legitimate activity. System owners are also advised to run the YARA tool on any system they suspect to have been targeted by HIDDEN COBRA actors. Additionally, the appendices of this report provide network signatures to aid in the detection and mitigation of HIDDEN COBRA activity. *"Network Signatures and Host-Based Rules"* This section contains network signatures and host-based rules that can be used to detect malicious activity associated with HIDDEN COBRA actors. Although created using a comprehensive vetting process, the possibility of false positives always remains. These signatures and rules should be used to supplement analysis and should not be used as a sole source of attributing this activity to HIDDEN COBRA actors. *"Network Signatures"* alert tcp any any -> any any (msg:"DPRK_HIDDEN_COBRA_DDoS_HANDSHAKE_SUCCESS"; dsize:6; flow:established,to_server; content:"|18 17 e9 e9 e9 e9|"; fast_pattern:only; sid:1; rev:1;) ________________________________________________________________ alert tcp any any -> any any (msg:"DPRK_HIDDEN_COBRA_Botnet_C2_Host_Beacon"; flow:established,to_server; content:"|1b 17 e9 e9 e9 e9|"; depth:6; fast_pattern; sid:1; rev:1;) ________________________________________________________________ *"YARA Rules"* { meta: description = RSA Key strings: $rsaKey = {7B 4E 1E A7 E9 3F 36 4C DE F4 F0 99 C4 D9 B7 94 A1 FF F2 97 D3 91 13 9D C0 12 02 E4 4C BB 6C 77 48 EE 6F 4B 9B 53 60 98 45 A5 28 65 8A 0B F8 39 73 D7 1A 44 13 B3 6A BB 61 44 AF 31 47 E7 87 C2 AE 7A A7 2C 3A D9 5C 2E 42 1A A6 78 FE 2C AD ED 39 3F FA D0 AD 3D D9 C5 3D 28 EF 3D 67 B1 E0 68 3F 58 A0 19 27 CC 27 C9 E8 D8 1E 7E EE 91 DD 13 B3 47 EF 57 1A CA FF 9A 60 E0 64 08 AA E2 92 D0} condition: any of them } ________________________________________________________________ { meta: description = DDoS Misspelled Strings strings: $STR1 = "Wating" wide ascii $STR2 = "Reamin" wide ascii $STR3 = "laptos" wide ascii condition: (uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) == 0x46445025 or uint32(1) == 0x6674725C) and 2 of them } ________________________________________________________________ { meta: description = DDoS Random URL Builder strings: $randomUrlBuilder = { 83 EC 48 53 55 56 57 8B 3D ?? ?? ?? ?? 33 C0 C7 44 24 28 B4 6F 41 00 C7 44 24 2C B0 6F 41 00 C7 44 24 30 AC 6F 41 00 C7 44 24 34 A8 6F 41 00 C7 44 24 38 A4 6F 41 00 C7 44 24 3C A0 6F 41 00 C7 44 24 40 9C 6F 41 00 C7 44 24 44 94 6F 41 00 C7 44 24 48 8C 6F 41 00 C7 44 24 4C 88 6F 41 00 C7 44 24 50 80 6F 41 00 89 44 24 54 C7 44 24 10 7C 6F 41 00 C7 44 24 14 78 6F 41 00 C7 44 24 18 74 6F 41 00 C7 44 24 1C 70 6F 41 00 C7 44 24 20 6C 6F 41 00 89 44 24 24 FF D7 99 B9 0B 00 00 00 F7 F9 8B 74 94 28 BA 9C 6F 41 00 66 8B 06 66 3B 02 74 34 8B FE 83 C9 FF 33 C0 8B 54 24 60 F2 AE 8B 6C 24 5C A1 ?? ?? ?? ?? F7 D1 49 89 45 00 8B FE 33 C0 8D 5C 11 05 83 C9 FF 03 DD F2 AE F7 D1 49 8B FE 8B D1 EB 78 FF D7 99 B9 05 00 00 00 8B 6C 24 5C F7 F9 83 C9 FF 33 C0 8B 74 94 10 8B 54 24 60 8B FE F2 AE F7 D1 49 BF 60 6F 41 00 8B D9 83 C9 FF F2 AE F7 D1 8B C2 49 03 C3 8B FE 8D 5C 01 05 8B 0D ?? ?? ?? ?? 89 4D 00 83 C9 FF 33 C0 03 DD F2 AE F7 D1 49 8D 7C 2A 05 8B D1 C1 E9 02 F3 A5 8B CA 83 E1 03 F3 A4 BF 60 6F 41 00 83 C9 FF F2 AE F7 D1 49 BE 60 6F 41 00 8B D1 8B FE 83 C9 FF 33 C0 F2 AE F7 D1 49 8B FB 2B F9 8B CA 8B C1 C1 E9 02 F3 A5 8B C8 83 E1 03 F3 A4 8B 7C 24 60 8D 75 04 57 56 E8 ?? ?? ?? ?? 83 C4 08 C6 04 3E 2E 8B C5 C6 03 00 5F 5E 5D 5B 83 C4 48 C3 } condition: $randomUrlBuilder } ________________________________________________________________ Impact A successful network intrusion can have severe impacts, particularly if the compromise becomes public and sensitive information is exposed. Possible impacts include: * temporary or permanent loss of sensitive or proprietary information, Solution *"Mitigation Strategies"* Network administrators are encouraged to apply the following recommendations, which can prevent as many as 85 percent of targeted cyber intrusions. The mitigation strategies provided may seem like common sense. However, many organizations fail to use these basic security measures, leaving their systems open to compromise: * *Patch applications and operating systems* Most attackers target vulnerable applications and operating systems. Ensuring that applications and operating systems are patched with the latest updates greatly reduces the number of exploitable entry points available to an attacker. Use best practices when updating software and patches by only downloading updates from authenticated vendor sites. *"Response to Unauthorized Network Access"* *Enforce your security incident response and business continuity plan.* It may take time for your organizations IT professionals to isolate and remove threats to your systems and restore normal operations. Meanwhile, you should take steps to maintain your organizations essential functions according to your business continuity plan. Organizations should maintain and regularly test backup plans, disaster recovery plans, and business continuity procedures. *Contact DHS or your local FBI office immediately.* To report an intrusion and request resources for incident response or technical assistance, you are encouraged to contact DHS NCCIC (NCCICCustomerService@hq.dhs.gov or 888-282-0870), the FBI through a local field office, or the FBIs Cyber Division (CyWatch@fbi.gov or 855-292-3937). *"Protect Against SQL Injection and Other Attacks on Web Services"* To protect against code injections and other attacks, system operators should routinely evaluate known and published vulnerabilities, periodically perform software updates and technology refreshes, and audit external-facing systems for known web application vulnerabilities. They should also take the following steps to harden both web applications and the servers hosting them to reduce the risk of network intrusion via this vector. * Use and configure available firewalls to block attacks. *"Permissions, Privileges, and Access Controls"* System operators should take the following steps to limit permissions, privileges, and access controls. * Reduce privileges to only those needed for a users duties. *"Logging Practices"* System operators should follow these secure logging practices. * Ensure event logging, including applications, events, login activities, and security attributes, is turned on or monitored for identification of security issues. |
Original Source
Url : http://www.us-cert.gov/ncas/alerts/TA17-164A |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-190 | Integer Overflow or Wraparound (CWE/SANS Top 25) |
50 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
CPE : Common Platform Enumeration
Snort® IPS/IDS
Date | Description |
---|---|
2020-09-19 | Adobe Flash Player AVM domain memory range integer overflow attempt RuleID : 54826 - Revision : 1 - Type : FILE-FLASH |
2020-09-19 | Adobe Flash Player AVM domain memory range integer overflow attempt RuleID : 54825 - Revision : 1 - Type : FILE-FLASH |
2018-08-16 | Microsoft Silverlight GetChar out of bounds read attempt RuleID : 47172 - Revision : 1 - Type : BROWSER-PLUGINS |
2018-08-16 | Microsoft Silverlight GetChar out of bounds read attempt RuleID : 47171 - Revision : 1 - Type : BROWSER-PLUGINS |
2017-11-14 | Adobe Flash Player toString type confusion memory corruption attempt RuleID : 44553 - Revision : 2 - Type : FILE-FLASH |
2017-11-14 | Adobe Flash Player toString type confusion memory corruption attempt RuleID : 44552 - Revision : 2 - Type : FILE-FLASH |
2017-07-25 | Hangul Word Processor type confusion attempt RuleID : 43264 - Revision : 2 - Type : FILE-OTHER |
2017-07-25 | Hangul Word Processor type confusion attempt RuleID : 43263 - Revision : 2 - Type : FILE-OTHER |
2017-07-25 | Hangul Word Processor type confusion attempt RuleID : 43262 - Revision : 2 - Type : FILE-OTHER |
2017-07-25 | Hangul Word Processor type confusion attempt RuleID : 43261 - Revision : 2 - Type : FILE-OTHER |
2017-07-25 | Hangul Word Processor type confusion attempt RuleID : 43260 - Revision : 2 - Type : FILE-OTHER |
2017-07-25 | Hangul Word Processor type confusion attempt RuleID : 43259 - Revision : 2 - Type : FILE-OTHER |
2017-06-15 | Win.Trojan.HiddenCobra variant outbound connection RuleID : 43194-community - Revision : 2 - Type : MALWARE-CNC |
2017-07-18 | Win.Trojan.HiddenCobra variant outbound connection RuleID : 43194 - Revision : 2 - Type : MALWARE-CNC |
2017-06-15 | Win.Trojan.HiddenCobra variant outbound connection RuleID : 43193-community - Revision : 2 - Type : MALWARE-CNC |
2017-07-18 | Win.Trojan.HiddenCobra variant outbound connection RuleID : 43193 - Revision : 2 - Type : MALWARE-CNC |
2016-12-20 | Microsoft Silverlight GetChar out of bounds read attempt RuleID : 40814 - Revision : 3 - Type : BROWSER-PLUGINS |
2016-12-20 | Microsoft Silverlight GetChar out of bounds read attempt RuleID : 40813 - Revision : 3 - Type : BROWSER-PLUGINS |
2016-06-14 | Adobe Flash Player DeleteRangeTimelineOperation type confusion attempt RuleID : 38875 - Revision : 4 - Type : FILE-FLASH |
2016-06-14 | Adobe Flash Player DeleteRangeTimelineOperation type confusion attempt RuleID : 38874 - Revision : 4 - Type : FILE-FLASH |
2016-05-10 | Adobe Flash Player toString type confusion memory corruption attempt RuleID : 38456 - Revision : 2 - Type : FILE-FLASH |
2016-05-10 | Adobe Flash Player toString type confusion memory corruption attempt RuleID : 38455 - Revision : 2 - Type : FILE-FLASH |
2016-05-10 | Adobe Flash Player toString type confusion memory corruption attempt RuleID : 38434 - Revision : 2 - Type : FILE-FLASH |
2016-05-10 | Adobe Flash Player toString type confusion memory corruption attempt RuleID : 38433 - Revision : 3 - Type : FILE-FLASH |
2016-05-10 | Adobe Flash Player toString type confusion memory corruption attempt RuleID : 38432 - Revision : 2 - Type : FILE-FLASH |
2016-05-10 | Adobe Flash Player toString type confusion memory corruption attempt RuleID : 38431 - Revision : 2 - Type : FILE-FLASH |
2016-05-10 | Adobe Flash Player toString type confusion memory corruption attempt RuleID : 38430 - Revision : 3 - Type : FILE-FLASH |
2016-05-10 | Adobe Flash Player toString type confusion memory corruption attempt RuleID : 38429 - Revision : 2 - Type : FILE-FLASH |
2016-03-14 | Microsoft Silverlight GetChar out of bounds read attempt RuleID : 37268 - Revision : 3 - Type : BROWSER-PLUGINS |
2016-03-14 | Microsoft Silverlight GetChar out of bounds read attempt RuleID : 37267 - Revision : 3 - Type : BROWSER-PLUGINS |
2016-03-14 | Adobe Flash Player AVM domain memory range integer overflow attempt RuleID : 37198 - Revision : 3 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash Player AVM domain memory range integer overflow attempt RuleID : 37197 - Revision : 3 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash Player AVM domain memory range integer overflow attempt RuleID : 37196 - Revision : 3 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash Player AVM domain memory range integer overflow attempt RuleID : 37195 - Revision : 3 - Type : FILE-FLASH |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2016-06-20 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201606-08.nasl - Type : ACT_GATHER_INFO |
2016-06-20 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_0c6b008d35c411e68e82002590263bf5.nasl - Type : ACT_GATHER_INFO |
2016-06-20 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_07888b4935c411e68e82002590263bf5.nasl - Type : ACT_GATHER_INFO |
2016-05-18 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2016-1305-1.nasl - Type : ACT_GATHER_INFO |
2016-05-18 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-587.nasl - Type : ACT_GATHER_INFO |
2016-05-17 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-585.nasl - Type : ACT_GATHER_INFO |
2016-05-16 | Name : The remote Mac OS X host has a browser plugin installed that is affected by m... File : macosx_flash_player_apsb16-15.nasl - Type : ACT_GATHER_INFO |
2016-05-16 | Name : The remote Windows host has a browser plugin installed that is affected by mu... File : adobe_air_apsb16-15.nasl - Type : ACT_GATHER_INFO |
2016-05-16 | Name : The remote Windows host has a browser plugin installed that is affected by mu... File : flash_player_apsb16-15.nasl - Type : ACT_GATHER_INFO |
2016-05-16 | Name : The remote Mac OS X host has a browser plugin installed that is affected by m... File : macosx_adobe_air_apsb16-15.nasl - Type : ACT_GATHER_INFO |
2016-05-16 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2016-1079.nasl - Type : ACT_GATHER_INFO |
2016-05-13 | Name : A web browser installed on the remote Mac OS X host is affected by multiple v... File : macosx_google_chrome_50_0_2661_102.nasl - Type : ACT_GATHER_INFO |
2016-05-13 | Name : A web browser installed on the remote Windows host is affected by multiple vu... File : google_chrome_50_0_2661_102.nasl - Type : ACT_GATHER_INFO |
2016-05-10 | Name : The remote Windows host has a browser plugin installed that is affected by mu... File : smb_nt_ms16-064.nasl - Type : ACT_GATHER_INFO |
2016-04-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-440.nasl - Type : ACT_GATHER_INFO |
2016-04-13 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2016-0990-1.nasl - Type : ACT_GATHER_INFO |
2016-04-13 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2016-0610.nasl - Type : ACT_GATHER_INFO |
2016-04-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-433.nasl - Type : ACT_GATHER_INFO |
2016-04-12 | Name : The remote Windows host has a browser plugin installed that is affected by mu... File : smb_nt_ms16-050.nasl - Type : ACT_GATHER_INFO |
2016-04-08 | Name : The remote Mac OS X host has a browser plugin installed that is affected by m... File : macosx_flash_player_apsb16-10.nasl - Type : ACT_GATHER_INFO |
2016-04-08 | Name : The remote Windows host has a browser plugin installed that is affected by mu... File : flash_player_apsb16-10.nasl - Type : ACT_GATHER_INFO |
2016-01-27 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201601-03.nasl - Type : ACT_GATHER_INFO |
2016-01-12 | Name : A multimedia application framework installed on the remote Windows host is af... File : smb_nt_ms16-006.nasl - Type : ACT_GATHER_INFO |
2016-01-12 | Name : A multimedia application framework installed on the remote Mac OS X host is a... File : macosx_ms16-006.nasl - Type : ACT_GATHER_INFO |
2016-01-04 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-2402-1.nasl - Type : ACT_GATHER_INFO |
2016-01-04 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2015-975.nasl - Type : ACT_GATHER_INFO |
2016-01-04 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-2401-1.nasl - Type : ACT_GATHER_INFO |
2015-12-30 | Name : The remote Windows host has a browser plugin installed that is affected by mu... File : smb_kb3132372.nasl - Type : ACT_GATHER_INFO |
2015-12-30 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2015-2697.nasl - Type : ACT_GATHER_INFO |
2015-12-30 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_84c7ea88bf044bdc973b36744bf540ab.nasl - Type : ACT_GATHER_INFO |
2015-12-29 | Name : The remote Windows host has a browser plugin installed that is affected by mu... File : adobe_air_apsb16-01.nasl - Type : ACT_GATHER_INFO |
2015-12-29 | Name : The remote Mac OS X host has a browser plugin installed that is affected by m... File : macosx_flash_player_apsb16-01.nasl - Type : ACT_GATHER_INFO |
2015-12-29 | Name : The remote Mac OS X host has a browser plugin installed that is affected by m... File : macosx_adobe_air_apsb16-01.nasl - Type : ACT_GATHER_INFO |
2015-12-29 | Name : The remote Windows host has a browser plugin installed that is affected by mu... File : flash_player_apsb16-01.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2017-08-24 00:22:31 |
|
2017-06-14 00:23:18 |
|