Saint Scanner version 6.6.4 released

SAINT is the Security Administrator’s Integrated Network Tool. It is used to non-intrusively detect security vulnerabilities on any remote target, including servers, workstations, networking devices, and other types of nodes. It will also gather information such as operating system types and open ports. The SAINT graphical user interface provides access to SAINT’s data management, scan configuration, scan scheduling, and data analysis capabilities through a web browser. Different aspects of the scan results are presented in hyperlinked HTML pages, and reports on complete scan results can be generated and saved.

New vulnerability checks in version 6.6.4:

  • Windows URI handling (shell32.dll) remote code execution (MS07-061)
  • Windows DNS Service Cache Poisoning Vulnerability (MS07-062)
  • Drupal vulnerabilities
  • RealPlayer vulnerabilities
  • Domino IMAP vulnerability
  • Symantec Mail Security for SMTP
  • DeleGate vulnerability
  • Macrovision InstallShield vulnerability
  • Nagios vulnerability
  • Tikiwiki vulnerabilities
  • QuickTime vulnerabilities
  • SonicWall WebCacheCleaner ActiveX vulnerability
  • ACDSee image viewer vulnerability
  • Symantec Altiris Deployment vulnerabilities
  • SonicStage vulnerability
  • IMail Client remote buffer overflow
  • OpenLDAP vulnerabilities
  • CUPS vulnerabilities
  • perl vulnerabilities
  • Python vulnerability
  • Pidgin vulnerabilities
  • Ruby vulnerability

New exploits in this version:

  • Tivoli Storage Manager CAD exploit
  • BrightStor ARCserve LGServer exploit
  • Lotus Domino IMAP exploit
  • EMC NetWorker Remote Exec service exploit

Post scriptum

Compliance Mandates

  • Vulnerability Scanner :

    PCI DSS 11.2, 6.6, SOX A13.3, GLBA 16CFR Part 314.4(c), HIPAA 164.308(a)(8), FISMA RA-5, SI-2, ISO 27001-27002 12.6, 15.2.2


Related Articles

Saint
Vulnerability Scanner