SAINT® v7.3.2 Released

SAINT is the Security Administrator’s Integrated Network Tool. It is used to non-intrusively detect security vulnerabilities on any remote target, including servers, workstations, networking devices, and other types of nodes. It will also gather information such as operating system types and open ports. The SAINT graphical user interface provides access to SAINT’s data management, scan configuration, scan scheduling, and data analysis capabilities through a web browser. Different aspects of the scan results are presented in hyperlinked HTML pages, and reports on complete scan results can be generated and saved.

New vulnerability checks in version 7.3.2:

  • Internet Explorer Cumulative Security Update. (MS10-018) (CVE2010-0267CVE2010-0488)
  • MIT Kerberos ’gss_accept_sec_context()’ Denial Of Service Vulnerability. (CVE2010-0628)
  • PHP Multiple Vulnerabilities fixed in 5.2.13.(CVE2010-1128CVE2010-1129CVE2010-1130)
  • Apple Safari Style Tag Remote Memory Corruption. (CVE2010-1029)
  • Apple Safari ’background’ attribute Remote Denial Of Service Vulnerability. (BID38447)
  • Microsoft SQL Server common "sa" passwords
  • Asterisk CIDR Notation in Access Rule Remote Security Bypass. (BID38424)
  • Trend Micro OfficeScan URL Filtering Engine Buffer Overflow Vulnerability. (CVE2010-0564)
  • Ingres Database iidbms Buffer Overflow Vulnerability. (BID38001)
  • vBulletin Multiple Cross Site Scripting Vulnerabilities. (BID38339)

New exploits in this version:

  • SAP GUI SAPBExCommonResources ActiveX Command Execution exploit
  • Liquid XML Studio ActiveX exploit
JPEG - 31.3 kb

Post scriptum

Compliance Mandates

  • Penetration testing & Ethical Hacking :

    PCI DSS 11.3, SOX A13.3, GLBA 16 CFR Part 314.4 (c), HIPAA 164.308(a)(8), FISMA RA-5, SI-2, ISO 27001/27002 12.6, 15.2.2

  • Vulnerability Management :

    PCI DSS 11.2, 6.6, SOX A13.3, GLBA 16CFR Part 314.4(c), HIPAA 164.308(a)(8), FISMA RA-5, SI-2, ISO 27001-27002 12.6, 15.2.2

Related Articles

Penetration testing & Ethical Hacking
Vulnerability Management