2016-AUG-11 FSL version 7.5.840

MCAFEE FOUNDSTONE FSL UPDATE

To better protect your environment McAfee has created this FSL check update for the Foundstone Product Suite. The following is a detailed summary of the new and updated checks included with this release.

NEW CHECKS

20368 - Splunk Enterprise Multiple OpenSSL Vulnerabilities (SP-CAAAPP4)

Category: General Vulnerability Assessment -> NonIntrusive -> Web Server Risk Level: High CVE: CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, CVE-2016-2108, CVE-2016-2109, CVE-2016-2176

Description Multiple vulnerabilities are present in some versions of Splunk Enterprise

Observation Splunk Enterprise is an operational intelligence solution

Multiple vulnerabilities are present in some versions of Splunk Enterprise. The flaws lie in the OpenSSL component. Successful exploitation by a remote attacker could lead to the information disclosure of sensitive information or cause a denial of service.

141240 - Red Hat Enterprise RHSA-2016-1582 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> Red Hat Enterprise Linux Patches and Hotfixes Risk Level: High CVE: CVE-2016-1000, CVE-2016-1000023

Description The scan detected that the host is missing the following update: RHSA-2016-1582

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://rhn.redhat.com/errata/RHSA-2016-1582.html

RHEL6_6S noarch nodejs010-nodejs-minimatch-3.0.2-1.el6

RHEL6S noarch nodejs010-nodejs-minimatch-3.0.2-1.el6

RHEL6WS noarch nodejs010-nodejs-minimatch-3.0.2-1.el6

RHEL7S noarch nodejs010-nodejs-minimatch-3.0.2-1.el7

RHEL7WS noarch nodejs010-nodejs-minimatch-3.0.2-1.el7

141245 - Red Hat Enterprise Linux RHSA-2016-1583 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> Red Hat Enterprise Linux Patches and Hotfixes Risk Level: High CVE: CVE-2016-1000, CVE-2016-1000023

Description The scan detected that the host is missing the following update: RHSA-2016-1583

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://rhn.redhat.com/errata/RHSA-2016-1583.html

RHEL6_6S noarch rh-nodejs4-nodejs-minimatch-3.0.2-1.el6

RHEL6S noarch rh-nodejs4-nodejs-minimatch-3.0.2-1.el6

RHEL6WS noarch rh-nodejs4-nodejs-minimatch-3.0.2-1.el6

RHEL7S noarch rh-nodejs4-nodejs-minimatch-3.0.2-1.el7

RHEL7WS noarch rh-nodejs4-nodejs-minimatch-3.0.2-1.el7

20423 - Mozilla Firefox Multiple Vulnerabilities Prior To 48

Category: Windows Host Assessment -> Miscellaneous (CATEGORY REQUIRES CREDENTIALS) Risk Level: High CVE: CVE-2016-0718, CVE-2016-2830, CVE-2016-2835, CVE-2016-2836, CVE-2016-2837, CVE-2016-2838, CVE-2016-2839, CVE- 2016-5250, CVE-2016-5251, CVE-2016-5252, CVE-2016-5253, CVE-2016-5254, CVE-2016-5255, CVE-2016-5258, CVE-2016-5259, CVE-2016-5260, CVE-2016-5261, CVE-2016-5262, CVE-2016-5263, CVE-2016-5264, CVE-2016-5265, CVE-2016-5266, CVE-2016- 5267, CVE-2016-5268

Description Multiple vulnerabilities are present in some versions of Mozilla Firefox. Observation Mozilla Firefox is a popular web browser.

Multiple vulnerabilities are present in some versions of Mozilla Firefox. The flaws lie in multiple components. Successful exploitation could allow an attacker to execute arbitrary code, to obtain sensitive information, to cause a denial of service condition or to bypass security measures.

20424 - Mozilla Firefox Multiple Vulnerabilities Prior To 48

Category: SSH Module -> NonIntrusive -> SSH Miscellaneous Risk Level: High CVE: CVE-2016-0718, CVE-2016-2830, CVE-2016-2835, CVE-2016-2836, CVE-2016-2837, CVE-2016-2838, CVE-2016-2839, CVE- 2016-5250, CVE-2016-5251, CVE-2016-5252, CVE-2016-5253, CVE-2016-5254, CVE-2016-5255, CVE-2016-5258, CVE-2016-5259, CVE-2016-5260, CVE-2016-5261, CVE-2016-5262, CVE-2016-5263, CVE-2016-5264, CVE-2016-5265, CVE-2016-5266, CVE-2016- 5267, CVE-2016-5268

Description Multiple vulnerabilities are present in some versions of Mozilla Firefox.

Observation Mozilla Firefox is a popular web browser.

Multiple vulnerabilities are present in some versions of Mozilla Firefox. The flaws lie in multiple components. Successful exploitation could allow an attacker to execute arbitrary code, to obtain sensitive information, to cause a denial of service condition or to bypass security measures.

20425 - Mozilla Firefox ESR Multiple Vulnerabilities Prior To 45.3

Category: Windows Host Assessment -> Miscellaneous (CATEGORY REQUIRES CREDENTIALS) Risk Level: High CVE: CVE-2016-2830, CVE-2016-2836, CVE-2016-2837, CVE-2016-2838, CVE-2016-2839, CVE-2016-5252, CVE-2016-5254, CVE- 2016-5258, CVE-2016-5259, CVE-2016-5262, CVE-2016-5263, CVE-2016-5264, CVE-2016-5265

Description Multiple vulnerabilities are present in some versions of Mozilla Firefox ESR.

Observation Mozilla Firefox is a popular web browser.

Multiple vulnerabilities are present in some versions of Mozilla Firefox ESR. The flaws lie in several components. Successful exploitation could allow an attacker to cause a denial of service condition, conduct spoofing attacks, escalate privileges or execute arbitrary code.

20426 - Mozilla Firefox ESR Multiple Vulnerabilities Prior To 45.3

Category: SSH Module -> NonIntrusive -> SSH Miscellaneous Risk Level: High CVE: CVE-2016-2830, CVE-2016-2836, CVE-2016-2837, CVE-2016-2838, CVE-2016-2839, CVE-2016-5252, CVE-2016-5254, CVE- 2016-5258, CVE-2016-5259, CVE-2016-5262, CVE-2016-5263, CVE-2016-5264, CVE-2016-5265

Description Multiple vulnerabilities are present in some versions of Mozilla Firefox ESR. Observation Mozilla Firefox is a popular web browser.

Multiple vulnerabilities are present in some versions of Mozilla Firefox ESR. The flaws lie in several components. Successful exploitation could allow an attacker to cause a denial of service condition, conduct spoofing attacks, escalate privileges or execute arbitrary code.

82250 - FreeBSD bind9 Denial Of Service In Named(8) (ef3306fc-8f9b-11db-ab33-000e0c2e438a)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: High CVE: CVE-2006-4095, CVE-2006-4096

Description The scan detected that the host is missing the following update: bind9 -- Denial of Service in named(8) (ef3306fc-8f9b-11db-ab33-000e0c2e438a)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/ef3306fc-8f9b-11db-ab33-000e0c2e438a.html

Affected packages: 6.1 <= FreeBSD < 6.1_6 6.0 <= FreeBSD < 6.0_11 5.5 <= FreeBSD < 5.5_4 5.4 <= FreeBSD < 5.4_18 5.0 <= FreeBSD < 5.3_33 9.0 < bind9 < 9.3.2.1

82453 - FreeBSD IP Fragment Handling Panic (52ba7713-9d42-11da-8c1d-000e0c2e438a)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: High CVE: CVE-2006-0381

Description The scan detected that the host is missing the following update: pf -- IP fragment handling panic (52ba7713-9d42-11da-8c1d-000e0c2e438a)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/52ba7713-9d42-11da-8c1d-000e0c2e438a.html

Affected packages: 6.0 <= FreeBSD < 6.0_4 5.4 <= FreeBSD < 5.4_10 5.3 <= FreeBSD < 5.3_25

82599 - FreeBSD kernel TCP Connection Stall Denial Of Service (3ec8f43b-e8ef-11d9-b875-0001020eed82)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: High CVE: CVE-2005-0356, CVE-2005-2068

Description The scan detected that the host is missing the following update: kernel -- TCP connection stall denial of service (3ec8f43b-e8ef-11d9-b875-0001020eed82)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/3ec8f43b-e8ef-11d9-b875-0001020eed82.html

Affected packages: 5.4 <= FreeBSD < 5.4_3 5.* <= FreeBSD < 5.3_17 4.11 <= FreeBSD < 4.11_11 FreeBSD < 4.10_16

144778 - SuSE SLES 12 SP1, SLED 12 SP1 SUSE-SU-2016:1997-1 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2016-3458, CVE-2016-3485, CVE-2016-3498, CVE-2016-3500, CVE-2016-3503, CVE-2016-3508, CVE-2016-3511, CVE- 2016-3550, CVE-2016-3598, CVE-2016-3606, CVE-2016-3610

Description The scan detected that the host is missing the following update: SUSE-SU-2016:1997-1

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.suse.com/pipermail/sle-security-updates/2016-August/002184.html

SuSE SLES 12 SP1 x86_64 java-1_7_0-openjdk-demo-1.7.0.111-33.1 java-1_7_0-openjdk-demo-debuginfo-1.7.0.111-33.1 java-1_7_0-openjdk-headless-debuginfo-1.7.0.111-33.1 java-1_7_0-openjdk-debuginfo-1.7.0.111-33.1 java-1_7_0-openjdk-devel-debuginfo-1.7.0.111-33.1 java-1_7_0-openjdk-headless-1.7.0.111-33.1 java-1_7_0-openjdk-1.7.0.111-33.1 java-1_7_0-openjdk-devel-1.7.0.111-33.1 java-1_7_0-openjdk-debugsource-1.7.0.111-33.1

SuSE SLED 12 SP1 x86_64 java-1_7_0-openjdk-debuginfo-1.7.0.111-33.1 java-1_7_0-openjdk-headless-debuginfo-1.7.0.111-33.1 java-1_7_0-openjdk-debugsource-1.7.0.111-33.1 java-1_7_0-openjdk-1.7.0.111-33.1 java-1_7_0-openjdk-headless-1.7.0.111-33.1

144781 - SuSE SLES 12 SP1, SLED 12 SP1 SUSE-SU-2016:2012-1 Update Is Not Installed Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2016-3458, CVE-2016-3485, CVE-2016-3498, CVE-2016-3500, CVE-2016-3503, CVE-2016-3508, CVE-2016-3511, CVE- 2016-3550, CVE-2016-3552, CVE-2016-3587, CVE-2016-3598, CVE-2016-3606, CVE-2016-3610

Description The scan detected that the host is missing the following update: SUSE-SU-2016:2012-1

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.suse.com/pipermail/sle-security-updates/2016-August/002198.html

SuSE SLES 12 SP1 x86_64 java-1_8_0-openjdk-debuginfo-1.8.0.101-14.3 java-1_8_0-openjdk-demo-1.8.0.101-14.3 java-1_8_0-openjdk-devel-1.8.0.101-14.3 java-1_8_0-openjdk-demo-debuginfo-1.8.0.101-14.3 java-1_8_0-openjdk-1.8.0.101-14.3 java-1_8_0-openjdk-debugsource-1.8.0.101-14.3 java-1_8_0-openjdk-headless-debuginfo-1.8.0.101-14.3 java-1_8_0-openjdk-headless-1.8.0.101-14.3

SuSE SLED 12 SP1 x86_64 java-1_8_0-openjdk-debugsource-1.8.0.101-14.3 java-1_8_0-openjdk-1.8.0.101-14.3 java-1_8_0-openjdk-debuginfo-1.8.0.101-14.3 java-1_8_0-openjdk-headless-debuginfo-1.8.0.101-14.3 java-1_8_0-openjdk-headless-1.8.0.101-14.3

144785 - SuSE Linux 13.2 openSUSE-SU-2016:1979-1 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2016-3458, CVE-2016-3485, CVE-2016-3498, CVE-2016-3500, CVE-2016-3503, CVE-2016-3508, CVE-2016-3511, CVE- 2016-3550, CVE-2016-3552, CVE-2016-3587, CVE-2016-3598, CVE-2016-3606, CVE-2016-3610

Description The scan detected that the host is missing the following update: openSUSE-SU-2016:1979-1

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html

SuSE Linux 13.2 i586 java-1_8_0-openjdk-debugsource-1.8.0.101-30.2 java-1_8_0-openjdk-demo-debuginfo-1.8.0.101-30.2 java-1_8_0-openjdk-1.8.0.101-30.2 java-1_8_0-openjdk-devel-1.8.0.101-30.2 java-1_8_0-openjdk-src-1.8.0.101-30.2 java-1_8_0-openjdk-headless-debuginfo-1.8.0.101-30.2 java-1_8_0-openjdk-devel-debuginfo-1.8.0.101-30.2 java-1_8_0-openjdk-accessibility-1.8.0.101-30.2 java-1_8_0-openjdk-headless-1.8.0.101-30.2 java-1_8_0-openjdk-demo-1.8.0.101-30.2 java-1_8_0-openjdk-debuginfo-1.8.0.101-30.2 noarch java-1_8_0-openjdk-javadoc-1.8.0.101-30.2 x86_64 java-1_8_0-openjdk-debugsource-1.8.0.101-30.2 java-1_8_0-openjdk-demo-debuginfo-1.8.0.101-30.2 java-1_8_0-openjdk-1.8.0.101-30.2 java-1_8_0-openjdk-devel-1.8.0.101-30.2 java-1_8_0-openjdk-src-1.8.0.101-30.2 java-1_8_0-openjdk-headless-debuginfo-1.8.0.101-30.2 java-1_8_0-openjdk-devel-debuginfo-1.8.0.101-30.2 java-1_8_0-openjdk-accessibility-1.8.0.101-30.2 java-1_8_0-openjdk-headless-1.8.0.101-30.2 java-1_8_0-openjdk-demo-1.8.0.101-30.2 java-1_8_0-openjdk-debuginfo-1.8.0.101-30.2

185369 - Ubuntu Linux 14.04, 16.04 USN-3041-1 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> Ubuntu Patches and Hotfixes Risk Level: High CVE: CVE-2016-1705, CVE-2016-1706, CVE-2016-1710, CVE-2016-1711, CVE-2016-5127, CVE-2016-5128, CVE-2016-5129, CVE- 2016-5130, CVE-2016-5131, CVE-2016-5132, CVE-2016-5133, CVE-2016-5134, CVE-2016-5135, CVE-2016-5137

Description The scan detected that the host is missing the following update: USN-3041-1

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-August/003518.html

Ubuntu 14.04 liboxideqtcore0_1.16.5-0ubuntu0.14.04.1

Ubuntu 16.04 liboxideqtcore0_1.16.5-0ubuntu0.16.04.1

82012 - FreeBSD FreeBSD DNs Cache Poisoning (655ee1ec-511b-11dd-80ba-000bcdf0a03b)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: High CVE: CVE-2008-1447

Description The scan detected that the host is missing the following update: FreeBSD -- DNS cache poisoning (655ee1ec-511b-11dd-80ba-000bcdf0a03b)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/655ee1ec-511b-11dd-80ba-000bcdf0a03b.html

Affected packages: 6.3 <= FreeBSD < 6.3_3 7.0 <= FreeBSD < 7.0_3

82455 - FreeBSD iEEE 802.11 Buffer Overflow (dade3316-9d31-11da-8c1d-000e0c2e438a)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: High CVE: CVE-2006-0226

Description The scan detected that the host is missing the following update: IEEE 802.11 -- buffer overflow (dade3316-9d31-11da-8c1d-000e0c2e438a)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/dade3316-9d31-11da-8c1d-000e0c2e438a.html

Affected packages: 6.0 <= FreeBSD < 6.0_3

82456 - FreeBSD ipfw IP Fragment Denial Of Service (d7c1d00d-9d2e-11da-8c1d-000e0c2e438a)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: High CVE: CVE-2006-0054

Description The scan detected that the host is missing the following update: ipfw -- IP fragment denial of service (d7c1d00d-9d2e-11da-8c1d-000e0c2e438a)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/d7c1d00d-9d2e-11da-8c1d-000e0c2e438a.html

Affected packages: 6.0 <= FreeBSD < 6.0_2

88795 - Slackware Linux 13.0, 13.1, 13.37, 14.0, 14.1, 14.2 SSA:2016-219-03 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> Slackware Patches and Hotfixes Risk Level: High CVE: CVE-2015-8325, CVE-2016-6210 Description The scan detected that the host is missing the following update: SSA:2016-219-03

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.613746

Slackware 14.0 x86_64 openssh-7.3p1-x86_64-1

Slackware 13.37 x86_64 openssh-7.3p1-x86_64-1

Slackware 14.1 x86_64 openssh-7.3p1-x86_64-1

Slackware 13.1 x86_64 openssh-7.3p1-x86_64-1

Slackware 14.2 x86_64 openssh-7.3p1-x86_64-1 i586 openssh-7.3p1-i586-1

Slackware 13.0 x86_64 openssh-7.3p1-x86_64-1

132270 - Oracle VM OVMSA-2016-0094 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> Oracle VM Patches and Hotfixes Risk Level: High CVE: CVE-2015-8660, CVE-2016-4470

Description The scan detected that the host is missing the following update: OVMSA-2016-0094

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://oss.oracle.com/pipermail/oraclevm-errata/2016-August/000510.html

OVM3.4 x86_64 kernel-uek-4.1.12-37.6.2.el6uek kernel-uek-firmware-4.1.12-37.6.2.el6uek 141241 - Red Hat Enterprise Linux RHSA-2016-1551 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> Red Hat Enterprise Linux Patches and Hotfixes Risk Level: High CVE: CVE-2016-2830, CVE-2016-2836, CVE-2016-2837, CVE-2016-2838, CVE-2016-5252, CVE-2016-5254, CVE-2016-5258, CVE- 2016-5259, CVE-2016-5262, CVE-2016-5263, CVE-2016-5264, CVE-2016-5265

Description The scan detected that the host is missing the following update: RHSA-2016-1551

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://rhn.redhat.com/errata/RHSA-2016-1551.html

RHEL5S i386 firefox-45.3.0-1.el5_11 firefox-debuginfo-45.3.0-1.el5_11 x86_64 firefox-45.3.0-1.el5_11 firefox-debuginfo-45.3.0-1.el5_11

RHEL7S x86_64 firefox-debuginfo-45.3.0-1.el7_2 firefox-45.3.0-1.el7_2

RHEL6S i386 firefox-debuginfo-45.3.0-1.el6_8 firefox-45.3.0-1.el6_8 x86_64 firefox-debuginfo-45.3.0-1.el6_8 firefox-45.3.0-1.el6_8

RHEL6WS x86_64 firefox-debuginfo-45.3.0-1.el6_8 firefox-45.3.0-1.el6_8 i386 firefox-debuginfo-45.3.0-1.el6_8 firefox-45.3.0-1.el6_8

RHEL5D x86_64 firefox-45.3.0-1.el5_11 firefox-debuginfo-45.3.0-1.el5_11 i386 firefox-45.3.0-1.el5_11 firefox-debuginfo-45.3.0-1.el5_11 RHEL7D x86_64 firefox-debuginfo-45.3.0-1.el7_2 firefox-45.3.0-1.el7_2

RHEL6D x86_64 firefox-debuginfo-45.3.0-1.el6_8 firefox-45.3.0-1.el6_8 i386 firefox-debuginfo-45.3.0-1.el6_8 firefox-45.3.0-1.el6_8

RHEL7WS x86_64 firefox-debuginfo-45.3.0-1.el7_2 firefox-45.3.0-1.el7_2

141242 - Red Hat Enterprise Linux RHSA-2016-1580 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> Red Hat Enterprise Linux Patches and Hotfixes Risk Level: High CVE: CVE-2016-5139, CVE-2016-5140, CVE-2016-5141, CVE-2016-5142, CVE-2016-5143, CVE-2016-5144, CVE-2016-5145, CVE- 2016-5146

Description The scan detected that the host is missing the following update: RHSA-2016-1580

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://rhn.redhat.com/errata/RHSA-2016-1580.html

RHEL6D x86_64 chromium-browser-debuginfo-52.0.2743.116-1.el6 chromium-browser-52.0.2743.116-1.el6 i386 chromium-browser-debuginfo-52.0.2743.116-1.el6 chromium-browser-52.0.2743.116-1.el6

RHEL6S x86_64 chromium-browser-debuginfo-52.0.2743.116-1.el6 chromium-browser-52.0.2743.116-1.el6 i386 chromium-browser-debuginfo-52.0.2743.116-1.el6 chromium-browser-52.0.2743.116-1.el6

RHEL6WS x86_64 chromium-browser-debuginfo-52.0.2743.116-1.el6 chromium-browser-52.0.2743.116-1.el6 i386 chromium-browser-debuginfo-52.0.2743.116-1.el6 chromium-browser-52.0.2743.116-1.el6

144772 - SuSE SLES 12 SP1, SLED 12 SP1 SUSE-SU-2016:1945-1 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2016-6153

Description The scan detected that the host is missing the following update: SUSE-SU-2016:1945-1

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.suse.com/pipermail/sle-security-updates/2016-August/002175.html

SuSE SLES 12 SP1 x86_64 libsqlite3-0-32bit-3.8.10.2-3.1 sqlite3-debugsource-3.8.10.2-3.1 sqlite3-debuginfo-3.8.10.2-3.1 libsqlite3-0-debuginfo-32bit-3.8.10.2-3.1 libsqlite3-0-3.8.10.2-3.1 sqlite3-3.8.10.2-3.1 libsqlite3-0-debuginfo-3.8.10.2-3.1

SuSE SLED 12 SP1 x86_64 libsqlite3-0-32bit-3.8.10.2-3.1 sqlite3-debugsource-3.8.10.2-3.1 sqlite3-debuginfo-3.8.10.2-3.1 libsqlite3-0-3.8.10.2-3.1 libsqlite3-0-debuginfo-32bit-3.8.10.2-3.1 libsqlite3-0-debuginfo-3.8.10.2-3.1 sqlite3-3.8.10.2-3.1

144773 - SuSE SLES 12 SP1 SUSE-SU-2016:2008-1 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2015-3455, CVE-2015-5400, CVE-2016-2569, CVE-2016-2570, CVE-2016-2571, CVE-2016-2572, CVE-2016-3947, CVE- 2016-3948, CVE-2016-4051, CVE-2016-4052, CVE-2016-4053, CVE-2016-4054, CVE-2016-4553, CVE-2016-4554, CVE-2016-4555, CVE-2016-4556

Description The scan detected that the host is missing the following update: SUSE-SU-2016:2008-1

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.suse.com/pipermail/sle-security-updates/2016-August/002194.html

SuSE SLES 12 SP1 x86_64 squid-debugsource-3.3.14-20.2 squid-3.3.14-20.2 squid-debuginfo-3.3.14-20.2

144774 - SuSE SLES 11 SP4 SUSE-SU-2016:1985-1 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2015-7833, CVE-2016-0758, CVE-2016-1583, CVE-2016-2053, CVE-2016-2187, CVE-2016-3134, CVE-2016-3707, CVE- 2016-4470, CVE-2016-4482, CVE-2016-4485, CVE-2016-4486, CVE-2016-4565, CVE-2016-4569, CVE-2016-4578, CVE-2016-4580, CVE-2016-4805, CVE-2016-4913, CVE-2016-4997, CVE-2016-5244, CVE-2016-5829

Description The scan detected that the host is missing the following update: SUSE-SU-2016:1985-1

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.suse.com/pipermail/sle-security-updates/2016-August/002180.html

SuSE SLES 11 SP4 x86_64 kernel-source-rt-3.0.101.rt130-57.1 kernel-rt_trace-base-3.0.101.rt130-57.1 kernel-rt-3.0.101.rt130-57.1 kernel-rt-base-3.0.101.rt130-57.1 kernel-rt_trace-3.0.101.rt130-57.1 kernel-rt-devel-3.0.101.rt130-57.1 kernel-syms-rt-3.0.101.rt130-57.1 kernel-rt_trace-devel-3.0.101.rt130-57.1

144776 - SuSE Linux 13.2 openSUSE-SU-2016:1977-1 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2014-9862

Description The scan detected that the host is missing the following update: openSUSE-SU-2016:1977-1

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.opensuse.org/opensuse-updates/2016-08/msg00026.html

SuSE Linux 13.2 x86_64 bsdiff-4.3-2.5.2 i586 bsdiff-4.3-2.5.2

144777 - SuSE SLES 11 SP4 SUSE-SU-2016:1996-1 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2011-3205, CVE-2011-4096, CVE-2012-5643, CVE-2013-0188, CVE-2013-4115, CVE-2014-0128, CVE-2014-6270, CVE- 2014-7141, CVE-2014-7142, CVE-2015-5400, CVE-2016-2390, CVE-2016-2569, CVE-2016-2570, CVE-2016-2571, CVE-2016-2572, CVE-2016-3947, CVE-2016-3948, CVE-2016-4051, CVE-2016-4052, CVE-2016-4053, CVE-2016-4054, CVE-2016-4553, CVE-2016- 4554, CVE-2016-4555, CVE-2016-4556

Description The scan detected that the host is missing the following update: SUSE-SU-2016:1996-1

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.suse.com/pipermail/sle-security-updates/2016-August/002183.html

SuSE SLES 11 SP4 i586 squid3-3.1.23-8.16.27.1 x86_64 squid3-3.1.23-8.16.27.1

144779 - SuSE SLES 11 SP4 SUSE-SU-2016:2018-1 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2016-4470, CVE-2016-4997, CVE-2016-5829

Description The scan detected that the host is missing the following update: SUSE-SU-2016:2018-1

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.suse.com/pipermail/sle-security-updates/2016-August/002201.html

SuSE SLES 11 SP4 i586 kernel-ec2-base-3.0.101-80.1 kernel-trace-devel-3.0.101-80.1 kernel-default-devel-3.0.101-80.1 kernel-pae-3.0.101-80.1 kernel-ec2-devel-3.0.101-80.1 kernel-default-base-3.0.101-80.1 kernel-pae-base-3.0.101-80.1 kernel-xen-base-3.0.101-80.1 kernel-ec2-3.0.101-80.1 kernel-syms-3.0.101-80.1 kernel-trace-3.0.101-80.1 kernel-source-3.0.101-80.1 kernel-xen-3.0.101-80.1 kernel-trace-base-3.0.101-80.1 kernel-default-3.0.101-80.1 kernel-pae-devel-3.0.101-80.1 kernel-xen-devel-3.0.101-80.1 x86_64 kernel-ec2-base-3.0.101-80.1 kernel-trace-devel-3.0.101-80.1 kernel-default-devel-3.0.101-80.1 kernel-ec2-devel-3.0.101-80.1 kernel-default-base-3.0.101-80.1 kernel-xen-base-3.0.101-80.1 kernel-ec2-3.0.101-80.1 kernel-syms-3.0.101-80.1 kernel-trace-3.0.101-80.1 kernel-source-3.0.101-80.1 kernel-xen-3.0.101-80.1 kernel-trace-base-3.0.101-80.1 kernel-default-3.0.101-80.1 kernel-xen-devel-3.0.101-80.1

144780 - SuSE Linux 13.2 openSUSE-SU-2016:1981-1 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2013-7458

Description The scan detected that the host is missing the following update: openSUSE-SU-2016:1981-1

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.opensuse.org/opensuse-updates/2016-08/msg00030.html

SuSE Linux 13.2 x86_64 redis-debugsource-2.8.22-2.12.1 redis-2.8.22-2.12.1 redis-debuginfo-2.8.22-2.12.1 i586 redis-debugsource-2.8.22-2.12.1 redis-2.8.22-2.12.1 redis-debuginfo-2.8.22-2.12.1

144783 - SuSE SLES 11 SP4 SUSE-SU-2016:2013-1 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2015-8935, CVE-2016-5766, CVE-2016-5767, CVE-2016-5769, CVE-2016-5772

Description The scan detected that the host is missing the following update: SUSE-SU-2016:2013-1

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.suse.com/pipermail/sle-security-updates/2016-August/002199.html

SuSE SLES 11 SP4 i586 php53-sysvshm-5.3.17-74.1 php53-xmlwriter-5.3.17-74.1 php53-exif-5.3.17-74.1 php53-dba-5.3.17-74.1 php53-xmlreader-5.3.17-74.1 php53-intl-5.3.17-74.1 php53-odbc-5.3.17-74.1 php53-fileinfo-5.3.17-74.1 php53-sysvsem-5.3.17-74.1 php53-pcntl-5.3.17-74.1 php53-zip-5.3.17-74.1 php53-xsl-5.3.17-74.1 php53-tokenizer-5.3.17-74.1 php53-snmp-5.3.17-74.1 php53-suhosin-5.3.17-74.1 php53-bz2-5.3.17-74.1 php53-bcmath-5.3.17-74.1 php53-json-5.3.17-74.1 php53-openssl-5.3.17-74.1 php53-calendar-5.3.17-74.1 php53-gmp-5.3.17-74.1 php53-gd-5.3.17-74.1 php53-xmlrpc-5.3.17-74.1 php53-soap-5.3.17-74.1 php53-ldap-5.3.17-74.1 php53-fastcgi-5.3.17-74.1 php53-dom-5.3.17-74.1 php53-pspell-5.3.17-74.1 apache2-mod_php53-5.3.17-74.1 php53-ctype-5.3.17-74.1 php53-wddx-5.3.17-74.1 php53-5.3.17-74.1 php53-mcrypt-5.3.17-74.1 php53-sysvmsg-5.3.17-74.1 php53-mbstring-5.3.17-74.1 php53-zlib-5.3.17-74.1 php53-gettext-5.3.17-74.1 php53-curl-5.3.17-74.1 php53-pgsql-5.3.17-74.1 php53-iconv-5.3.17-74.1 php53-pear-5.3.17-74.1 php53-ftp-5.3.17-74.1 php53-mysql-5.3.17-74.1 php53-shmop-5.3.17-74.1 php53-pdo-5.3.17-74.1 x86_64 php53-sysvshm-5.3.17-74.1 php53-xmlwriter-5.3.17-74.1 php53-exif-5.3.17-74.1 php53-dba-5.3.17-74.1 php53-xmlreader-5.3.17-74.1 php53-intl-5.3.17-74.1 php53-odbc-5.3.17-74.1 php53-fileinfo-5.3.17-74.1 php53-sysvsem-5.3.17-74.1 php53-pcntl-5.3.17-74.1 php53-zip-5.3.17-74.1 php53-xsl-5.3.17-74.1 php53-tokenizer-5.3.17-74.1 php53-snmp-5.3.17-74.1 php53-suhosin-5.3.17-74.1 php53-bz2-5.3.17-74.1 php53-bcmath-5.3.17-74.1 php53-json-5.3.17-74.1 php53-openssl-5.3.17-74.1 php53-calendar-5.3.17-74.1 php53-gmp-5.3.17-74.1 php53-gd-5.3.17-74.1 php53-xmlrpc-5.3.17-74.1 php53-soap-5.3.17-74.1 php53-ldap-5.3.17-74.1 php53-fastcgi-5.3.17-74.1 php53-dom-5.3.17-74.1 php53-pspell-5.3.17-74.1 apache2-mod_php53-5.3.17-74.1 php53-ctype-5.3.17-74.1 php53-wddx-5.3.17-74.1 php53-5.3.17-74.1 php53-mcrypt-5.3.17-74.1 php53-sysvmsg-5.3.17-74.1 php53-mbstring-5.3.17-74.1 php53-zlib-5.3.17-74.1 php53-gettext-5.3.17-74.1 php53-curl-5.3.17-74.1 php53-pgsql-5.3.17-74.1 php53-iconv-5.3.17-74.1 php53-pear-5.3.17-74.1 php53-ftp-5.3.17-74.1 php53-mysql-5.3.17-74.1 php53-shmop-5.3.17-74.1 php53-pdo-5.3.17-74.1

144784 - SuSE Linux 13.2 openSUSE-SU-2016:1982-1 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2016-5139, CVE-2016-5140, CVE-2016-5141, CVE-2016-5142, CVE-2016-5143, CVE-2016-5144, CVE-2016-5145, CVE- 2016-5146

Description The scan detected that the host is missing the following update: openSUSE-SU-2016:1982-1 Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.opensuse.org/opensuse-updates/2016-08/msg00031.html

SuSE Linux 13.2 x86_64 chromium-desktop-gnome-52.0.2743.116-114.1 chromium-52.0.2743.116-114.1 chromedriver-52.0.2743.116-114.1 chromium-ffmpegsumo-52.0.2743.116-114.1 chromium-desktop-kde-52.0.2743.116-114.1 i586 chromium-desktop-gnome-52.0.2743.116-114.1 chromium-52.0.2743.116-114.1 chromedriver-52.0.2743.116-114.1 chromium-ffmpegsumo-52.0.2743.116-114.1 chromium-desktop-kde-52.0.2743.116-114.1

144786 - SuSE Linux 13.2 openSUSE-SU-2016:1964-1 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2016-0718, CVE-2016-2830, CVE-2016-2835, CVE-2016-2836, CVE-2016-2837, CVE-2016-2838, CVE-2016-2839, CVE- 2016-5250, CVE-2016-5251, CVE-2016-5252, CVE-2016-5254, CVE-2016-5255, CVE-2016-5258, CVE-2016-5259, CVE-2016-5260, CVE-2016-5261, CVE-2016-5262, CVE-2016-5263, CVE-2016-5264, CVE-2016-5265, CVE-2016-5266, CVE-2016-5268

Description The scan detected that the host is missing the following update: openSUSE-SU-2016:1964-1

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.opensuse.org/opensuse-updates/2016-08/msg00017.html

SuSE Linux 13.2 x86_64 libsoftokn3-32bit-3.24-37.1 mozilla-nss-sysinit-3.24-37.1 MozillaFirefox-branding-upstream-48.0-74.1 MozillaFirefox-48.0-74.1 mozilla-nss-debuginfo-32bit-3.24-37.1 libfreebl3-3.24-37.1 libsoftokn3-3.24-37.1 MozillaFirefox-devel-48.0-74.1 mozilla-nss-certs-debuginfo-32bit-3.24-37.1 MozillaFirefox-translations-other-48.0-74.1 MozillaFirefox-translations-common-48.0-74.1 libsoftokn3-debuginfo-32bit-3.24-37.1 mozilla-nss-certs-32bit-3.24-37.1 mozilla-nss-sysinit-debuginfo-3.24-37.1 mozilla-nss-sysinit-32bit-3.24-37.1 mozilla-nss-debuginfo-3.24-37.1 mozilla-nss-32bit-3.24-37.1 MozillaFirefox-debugsource-48.0-74.1 MozillaFirefox-buildsymbols-48.0-74.1 mozilla-nss-tools-debuginfo-3.24-37.1 libfreebl3-debuginfo-3.24-37.1 mozilla-nss-sysinit-debuginfo-32bit-3.24-37.1 mozilla-nss-certs-debuginfo-3.24-37.1 mozilla-nss-certs-3.24-37.1 libsoftokn3-debuginfo-3.24-37.1 mozilla-nss-3.24-37.1 libfreebl3-32bit-3.24-37.1 mozilla-nss-debugsource-3.24-37.1 mozilla-nss-tools-3.24-37.1 MozillaFirefox-debuginfo-48.0-74.1 libfreebl3-debuginfo-32bit-3.24-37.1 mozilla-nss-devel-3.24-37.1 i586 MozillaFirefox-48.0-74.1 mozilla-nss-tools-debuginfo-3.24-37.1 mozilla-nss-certs-debuginfo-3.24-37.1 mozilla-nss-3.24-37.1 mozilla-nss-sysinit-debuginfo-3.24-37.1 MozillaFirefox-translations-other-48.0-74.1 MozillaFirefox-devel-48.0-74.1 MozillaFirefox-branding-upstream-48.0-74.1 MozillaFirefox-buildsymbols-48.0-74.1 libfreebl3-debuginfo-3.24-37.1 mozilla-nss-debugsource-3.24-37.1 mozilla-nss-debuginfo-3.24-37.1 mozilla-nss-tools-3.24-37.1 MozillaFirefox-translations-common-48.0-74.1 libsoftokn3-3.24-37.1 mozilla-nss-certs-3.24-37.1 mozilla-nss-sysinit-3.24-37.1 libsoftokn3-debuginfo-3.24-37.1 MozillaFirefox-debuginfo-48.0-74.1 libfreebl3-3.24-37.1 MozillaFirefox-debugsource-48.0-74.1 mozilla-nss-devel-3.24-37.1

160130 - CentOS 5, 6, 7 CESA-2016-1551 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> Cent OS Patches and Hotfixes Risk Level: High CVE: CVE-2016-2830, CVE-2016-2836, CVE-2016-2837, CVE-2016-2838, CVE-2016-5252, CVE-2016-5254, CVE-2016-5258, CVE- 2016-5259, CVE-2016-5262, CVE-2016-5263, CVE-2016-5264, CVE-2016-5265

Description The scan detected that the host is missing the following update: CESA-2016-1551

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.centos.org/pipermail/centos-announce/2016-August/022024.html http://lists.centos.org/pipermail/centos-announce/2016-August/022023.html http://lists.centos.org/pipermail/centos-announce/2016-August/022026.html CentOS 6 x86_64 firefox-45.3.0-1.el6.centos i686 firefox-45.3.0-1.el6.centos

CentOS 7 x86_64 firefox-45.3.0-1.el7.centos i686 firefox-45.3.0-1.el7.centos

CentOS 5 x86_64 firefox-45.3.0-1.el5.centos i386 firefox-45.3.0-1.el5.centos

160131 - CentOS 7 CESA-2016-1539 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> Cent OS Patches and Hotfixes Risk Level: High CVE: CVE-2015-8660, CVE-2016-2143, CVE-2016-4470

Description The scan detected that the host is missing the following update: CESA-2016-1539

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.centos.org/pipermail/centos-announce/2016-August/022025.html

CentOS 7 x86_64 kernel-debug-3.10.0-327.28.2.el7 python-perf-3.10.0-327.28.2.el7 kernel-3.10.0-327.28.2.el7 kernel-tools-libs-devel-3.10.0-327.28.2.el7 kernel-devel-3.10.0-327.28.2.el7 kernel-tools-3.10.0-327.28.2.el7 kernel-headers-3.10.0-327.28.2.el7 perf-3.10.0-327.28.2.el7 kernel-debug-devel-3.10.0-327.28.2.el7 kernel-tools-libs-3.10.0-327.28.2.el7 noarch kernel-doc-3.10.0-327.28.2.el7 kernel-abi-whitelists-3.10.0-327.28.2.el7

163130 - Oracle Enterprise Linux ELSA-2016-1551 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> Oracle Enterprise Linux Patches and Hotfixes Risk Level: High CVE: CVE-2016-2830, CVE-2016-2836, CVE-2016-2837, CVE-2016-2838, CVE-2016-5252, CVE-2016-5254, CVE-2016-5258, CVE- 2016-5259, CVE-2016-5262, CVE-2016-5263, CVE-2016-5264, CVE-2016-5265

Description The scan detected that the host is missing the following update: ELSA-2016-1551

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://oss.oracle.com/pipermail/el-errata/2016-August/006249.html http://oss.oracle.com/pipermail/el-errata/2016-August/006248.html http://oss.oracle.com/pipermail/el-errata/2016-August/006250.html

OEL6 x86_64 firefox-45.3.0-1.0.1.el6_8 i386 firefox-45.3.0-1.0.1.el6_8

OEL5 x86_64 firefox-45.3.0-1.0.1.el5_11 i386 firefox-45.3.0-1.0.1.el5_11

OEL7 x86_64 firefox-45.3.0-1.0.1.el7_2

163131 - Oracle Enterprise Linux ELSA-2016-1585 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> Oracle Enterprise Linux Patches and Hotfixes Risk Level: High CVE: CVE-2016-3710, CVE-2016-3712, CVE-2016-5403

Description The scan detected that the host is missing the following update: ELSA-2016-1585

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://oss.oracle.com/pipermail/el-errata/2016-August/006266.html

OEL6 x86_64 qemu-guest-agent-0.12.1.2-2.491.el6_8.3 qemu-img-0.12.1.2-2.491.el6_8.3 qemu-kvm-0.12.1.2-2.491.el6_8.3 qemu-kvm-tools-0.12.1.2-2.491.el6_8.3 i386 qemu-guest-agent-0.12.1.2-2.491.el6_8.3

163132 - Oracle Enterprise Linux ELSA-2016-3593 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> Oracle Enterprise Linux Patches and Hotfixes Risk Level: High CVE: CVE-2015-8660, CVE-2016-4470

Description The scan detected that the host is missing the following update: ELSA-2016-3593

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://oss.oracle.com/pipermail/el-errata/2016-August/006255.html http://oss.oracle.com/pipermail/el-errata/2016-August/006254.html

OEL7 x86_64 kernel-uek-debug-4.1.12-37.6.2.el7uek kernel-uek-firmware-4.1.12-37.6.2.el7uek kernel-uek-debug-devel-4.1.12-37.6.2.el7uek kernel-uek-doc-4.1.12-37.6.2.el7uek -modules-4.1.12-37.6.2.el7uek-0.5.2-1.el7 kernel-uek-4.1.12-37.6.2.el7uek kernel-uek-devel-4.1.12-37.6.2.el7uek

OEL6 x86_64 kernel-uek-doc-4.1.12-37.6.2.el6uek kernel-uek-debug-devel-4.1.12-37.6.2.el6uek kernel-uek-devel-4.1.12-37.6.2.el6uek kernel-uek-4.1.12-37.6.2.el6uek dtrace-modules-4.1.12-37.6.2.el6uek-0.5.2-1.el6 kernel-uek-debug-4.1.12-37.6.2.el6uek kernel-uek-firmware-4.1.12-37.6.2.el6uek

174993 - Scientific Linux Security ERRATA Critical: firefox on SL5.x, SL6.x, SL7.x i386/x86_64 (1608-2347)

Category: SSH Module -> NonIntrusive -> Scientific Linux Patches and HotFixes Risk Level: High CVE: CVE-2016-2830, CVE-2016-2836, CVE-2016-2837, CVE-2016-2838, CVE-2016-5252, CVE-2016-5254, CVE-2016-5258, CVE- 2016-5259, CVE-2016-5262, CVE-2016-5263, CVE-2016-5264, CVE-2016-5265

Description The scan detected that the host is missing the following update: Security ERRATA Critical: firefox on SL5.x, SL6.x, SL7.x i386/x86_64 (1608-2347)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://listserv.fnal.gov/scripts/wa.exe?A2=ind1608&L=scientific-linux-errata&F=&S=&P=2347 SL5 x86_64 firefox-45.3.0-1.el5_11 firefox-debuginfo-45.3.0-1.el5_11 i386 firefox-45.3.0-1.el5_11 firefox-debuginfo-45.3.0-1.el5_11

SL7 x86_64 firefox-debuginfo-45.3.0-1.el7_2 firefox-45.3.0-1.el7_2

SL6 x86_64 firefox-debuginfo-45.3.0-1.el6_8 firefox-45.3.0-1.el6_8 i386 firefox-debuginfo-45.3.0-1.el6_8 firefox-45.3.0-1.el6_8

174994 - Scientific Linux Security ERRATA Important: kernel on SL7.x x86_64 (1608-3509)

Category: SSH Module -> NonIntrusive -> Scientific Linux Patches and HotFixes Risk Level: High CVE: CVE-2015-8660, CVE-2016-2143, CVE-2016-4470

Description The scan detected that the host is missing the following update: Security ERRATA Important: kernel on SL7.x x86_64 (1608-3509)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://listserv.fnal.gov/scripts/wa.exe?A2=ind1608&L=scientific-linux-errata&F=&S=&P=3509

SL7 x86_64 kernel-debuginfo-common-x86_64-3.10.0-327.28.2.el7 kernel-tools-libs-3.10.0-327.28.2.el7 python-perf-debuginfo-3.10.0-327.28.2.el7 kernel-debug-debuginfo-3.10.0-327.28.2.el7 perf-debuginfo-3.10.0-327.28.2.el7 kernel-headers-3.10.0-327.28.2.el7 kernel-3.10.0-327.28.2.el7 kernel-tools-libs-devel-3.10.0-327.28.2.el7 python-perf-3.10.0-327.28.2.el7 kernel-tools-debuginfo-3.10.0-327.28.2.el7 kernel-debug-3.10.0-327.28.2.el7 kernel-tools-3.10.0-327.28.2.el7 kernel-devel-3.10.0-327.28.2.el7 perf-3.10.0-327.28.2.el7 kernel-debuginfo-3.10.0-327.28.2.el7 kernel-debug-devel-3.10.0-327.28.2.el7 noarch kernel-doc-3.10.0-327.28.2.el7 kernel-abi-whitelists-3.10.0-327.28.2.el7

174997 - Scientific Linux Security ERRATA Important: libtiff on SL7.x x86_64 (1608-2877)

Category: SSH Module -> NonIntrusive -> Scientific Linux Patches and HotFixes Risk Level: High CVE: CVE-2014-8127, CVE-2014-8129, CVE-2014-8130, CVE-2014-9330, CVE-2014-9655, CVE-2015-1547, CVE-2015-7554, CVE- 2015-8665, CVE-2015-8668, CVE-2015-8683, CVE-2015-8781, CVE-2015-8782, CVE-2015-8783, CVE-2015-8784, CVE-2016-3632, CVE-2016-3945, CVE-2016-3990, CVE-2016-3991, CVE-2016-5320

Description The scan detected that the host is missing the following update: Security ERRATA Important: libtiff on SL7.x x86_64 (1608-2877)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://listserv.fnal.gov/scripts/wa.exe?A2=ind1608&L=scientific-linux-errata&F=&S=&P=2877

SL7 x86_64 libtiff-tools-4.0.3-25.el7_2 libtiff-4.0.3-25.el7_2 libtiff-devel-4.0.3-25.el7_2 libtiff-debuginfo-4.0.3-25.el7_2 libtiff-static-4.0.3-25.el7_2

182035 - FreeBSD FreeBSD Integer Overflow In IP_MSFILTER (0844632f-5e78-11e6-a6c3-14dae9d210b8)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: High CVE: CVE-2013-3077

Description The scan detected that the host is missing the following update: FreeBSD -- integer overflow in IP_MSFILTER (0844632f-5e78-11e6-a6c3-14dae9d210b8)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/0844632f-5e78-11e6-a6c3-14dae9d210b8.html

Affected packages: 9.1 <= FreeBSD-kernel < 9.1_6 8.4 <= FreeBSD-kernel < 8.4_3 8.3 <= FreeBSD-kernel < 8.3_10

182040 - FreeBSD FreeBSD Kernel Memory Disclosure In Sctp (4) (dd48d9b9-5e7e-11e6-a6c3-14dae9d210b8)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: High CVE: CVE-2013-5209

Description The scan detected that the host is missing the following update: FreeBSD -- Kernel memory disclosure in sctp(4) (dd48d9b9-5e7e-11e6-a6c3-14dae9d210b8)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/dd48d9b9-5e7e-11e6-a6c3-14dae9d210b8.html

Affected packages: 9.1 <= FreeBSD-kernel < 9.1_6 8.4 <= FreeBSD-kernel < 8.4_3 8.3 <= FreeBSD-kernel < 8.3_10

182041 - FreeBSD perl Local Arbitrary Code Execution (72bfbb09-5a6a-11e6-a6c3-14dae9d210b8)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: High CVE: CVE-2016-1238

Description The scan detected that the host is missing the following update: perl -- local arbitrary code execution (72bfbb09-5a6a-11e6-a6c3-14dae9d210b8)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/72bfbb09-5a6a-11e6-a6c3-14dae9d210b8.html

Affected packages: 5.18 <= perl5 < 5.18.99 5.18 <= perl5.18 < 5.18.99 5.18 <= perl5.20 < 5.18.99 5.18 <= perl5.22 < 5.18.99 5.18 <= perl5.24 < 5.18.99 5.20 <= perl5 < 5.20.99 5.20 <= perl5.18 < 5.20.99 5.20 <= perl5.20 < 5.20.99 5.20 <= perl5.22 < 5.20.99 5.20 <= perl5.24 < 5.20.99 5.22 <= perl5 < 5.22.3 5.22 <= perl5.18 < 5.22.3 5.22 <= perl5.20 < 5.22.3 5.22 <= perl5.22 < 5.22.3 5.22 <= perl5.24 < 5.22.3 5.24 <= perl5 < 5.24.1 5.24 <= perl5.18 < 5.24.1 5.24 <= perl5.20 < 5.24.1 5.24 <= perl5.22 < 5.24.1 5.24 <= perl5.24 < 5.24.1 perl5-devel < 5.25.3.99 185370 - Ubuntu Linux 12.04, 14.04, 16.04 USN-3044-1 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> Ubuntu Patches and Hotfixes Risk Level: High CVE: CVE-2016-0718, CVE-2016-2830, CVE-2016-2835, CVE-2016-2836, CVE-2016-2837, CVE-2016-2838, CVE-2016-2839, CVE- 2016-5250, CVE-2016-5251, CVE-2016-5252, CVE-2016-5254, CVE-2016-5255, CVE-2016-5258, CVE-2016-5259, CVE-2016-5260, CVE-2016-5261, CVE-2016-5262, CVE-2016-5263, CVE-2016-5264, CVE-2016-5265, CVE-2016-5266, CVE-2016-5268

Description The scan detected that the host is missing the following update: USN-3044-1

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-August/003517.html

Ubuntu 12.04 firefox_48.0+build2-0ubuntu0.12.04.1

Ubuntu 16.04 firefox_48.0+build2-0ubuntu0.16.04.1

Ubuntu 14.04 firefox_48.0+build2-0ubuntu0.14.04.1

20427 - Apache OpenOffice OTP File Remote Code Execution Vulnerability

Category: Windows Host Assessment -> Miscellaneous (CATEGORY REQUIRES CREDENTIALS) Risk Level: Medium CVE: CVE-2016-1513

Description A vulnerability is present in some versions of Apache OpenOffice.

Observation Apache OpenOffice is an open source office software suite.

A vulnerability is present in some versions of Apache OpenOffice. The flaw lies in the Impress component. Successful exploitation requires the use of a maliciously crafted ODP or OTP file, and could allow an attacker to cause a denial of service condition or remotely execute arbitrary code.

141244 - Red Hat Enterprise Linux RHSA-2016-1573 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> Red Hat Enterprise Linux Patches and Hotfixes Risk Level: Medium CVE: CVE-2016-4051, CVE-2016-5408

Description The scan detected that the host is missing the following update: RHSA-2016-1573

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://rhn.redhat.com/errata/RHSA-2016-1573.html

RHEL6S i386 squid-debuginfo-3.1.23-16.el6_8.6 squid-3.1.23-16.el6_8.6 x86_64 squid-debuginfo-3.1.23-16.el6_8.6 squid-3.1.23-16.el6_8.6

RHEL6WS x86_64 squid-debuginfo-3.1.23-16.el6_8.6 squid-3.1.23-16.el6_8.6 i386 squid-debuginfo-3.1.23-16.el6_8.6 squid-3.1.23-16.el6_8.6

144782 - SuSE SLED 12 SP1 SUSE-SU-2016:1962-1 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: Medium CVE: CVE-2016-4994

Description The scan detected that the host is missing the following update: SUSE-SU-2016:1962-1

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.suse.com/pipermail/sle-security-updates/2016-August/002178.html

SuSE SLED 12 SP1 x86_64 gimp-plugins-python-2.8.10-7.8 gimp-debuginfo-2.8.10-7.8 libgimp-2_0-0-2.8.10-7.8 gimp-plugins-python-debuginfo-2.8.10-7.8 gimp-debugsource-2.8.10-7.8 libgimp-2_0-0-debuginfo-2.8.10-7.8 libgimpui-2_0-0-2.8.10-7.8 gimp-2.8.10-7.8 libgimpui-2_0-0-debuginfo-2.8.10-7.8 noarch gimp-lang-2.8.10-7.8 174996 - Scientific Linux Security ERRATA Moderate: squid on SL6.x i386/x86_64 (1608-4221)

Category: SSH Module -> NonIntrusive -> Scientific Linux Patches and HotFixes Risk Level: Medium CVE: CVE-2016-4051, CVE-2016-5408

Description The scan detected that the host is missing the following update: Security ERRATA Moderate: squid on SL6.x i386/x86_64 (1608-4221)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://listserv.fnal.gov/scripts/wa.exe?A2=ind1608&L=scientific-linux-errata&F=&S=&P=4221

SL6 x86_64 squid-debuginfo-3.1.23-16.el6_8.6 squid-3.1.23-16.el6_8.6 i386 squid-debuginfo-3.1.23-16.el6_8.6 squid-3.1.23-16.el6_8.6

182044 - FreeBSD FreeBSD Incorrect Privilege Validation In The NFS Server (e5d2442d-5e76-11e6-a6c3-14dae9d210b8)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2013-4851

Description The scan detected that the host is missing the following update: FreeBSD -- Incorrect privilege validation in the NFS server (e5d2442d-5e76-11e6-a6c3-14dae9d210b8)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/e5d2442d-5e76-11e6-a6c3-14dae9d210b8.html

Affected packages: 9.1 <= FreeBSD-kernel < 9.1_5 8.3 <= FreeBSD-kernel < 8.3_9

185373 - Ubuntu Linux 12.04 USN-3046-1 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> Ubuntu Patches and Hotfixes Risk Level: Medium CVE: CVE-2016-1513

Description The scan detected that the host is missing the following update: USN-3046-1 Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-August/003515.html

Ubuntu 12.04 libreoffice-core_3.5.7-0ubuntu12

20371 - Wireshark Multiple Vulnerabilities Prior To 2.0.5

Category: Windows Host Assessment -> Miscellaneous (CATEGORY REQUIRES CREDENTIALS) Risk Level: Medium CVE: CVE-MAP-NOMATCH

Description Multiple vulnerabilities are present in some versions of Wireshark.

Observation Wireshark is a popular network protocol analyzer.

Multiple vulnerabilities are present in some versions of Wireshark. The flaws lie in multiple components. Successful exploitation could allow an attack to crash the application or to cause the software to increase the consumption of CPU resources. Exploitation requires an attacker to inject a malformed packet into the network or convince the user to open a crafted packet trace file.

20422 - Cisco IOS Software Border Gateway Protocol Message Processing Denial of Service Vulnerability

Category: SSH Module -> NonIntrusive -> Cisco IOS Patches and Hotfixes Risk Level: Medium CVE: CVE-2016-1459

Description A denial of service vulnerability is present in some versions of Cisco IOS.

Observation Cisco IOS is an used in Cisco devices.

A denial of service vulnerability is present in some versions of Cisco IOS. The flaw lies in the processing of BGP message. Successful exploitation could allow an attacker to cause target device reload.

82167 - FreeBSD FreeBSD Buffer Overflow In Tcpdump(1) (2dc764fa-40c0-11dc-aeac-02e0185f8d72)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2007-3798

Description The scan detected that the host is missing the following update: FreeBSD -- Buffer overflow in tcpdump(1) (2dc764fa-40c0-11dc-aeac-02e0185f8d72)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/2dc764fa-40c0-11dc-aeac-02e0185f8d72.html

Affected packages: tcpdump < 3.9.6 6.2 <= FreeBSD < 6.2_7 6.1 <= FreeBSD < 6.1_19 5.5 <= FreeBSD < 5.5_15

82168 - FreeBSD FreeBSD Predictable Query Ids In Named(8) (3de342fb-40be-11dc-aeac-02e0185f8d72)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2007-2926

Description The scan detected that the host is missing the following update: FreeBSD -- Predictable query ids in named(8) (3de342fb-40be-11dc-aeac-02e0185f8d72)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/3de342fb-40be-11dc-aeac-02e0185f8d72.html

Affected packages: 9.4 < named < 9.4.1.1 9.3 < named < 9.3.4.1 6.2 <= FreeBSD < 6.2_7 6.1 <= FreeBSD < 6.1_19 5.5 <= FreeBSD < 5.5_15

82203 - FreeBSD FreeBSD Heap Overflow In File(1) (8e01ab5b-0949-11dc-8163-000e0c2e438a)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2007-1536

Description The scan detected that the host is missing the following update: FreeBSD -- heap overflow in file(1) (8e01ab5b-0949-11dc-8163-000e0c2e438a)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/8e01ab5b-0949-11dc-8163-000e0c2e438a.html

Affected packages: file < 4.21 6.2 <= FreeBSD < 6.2_5 6.1 <= FreeBSD < 6.1_17 5.5 <= FreeBSD < 5.5_13

82210 - FreeBSD FreeBSD IPv6 Routing Header 0 Is Dangerous (275b845e-f56c-11db-8163-000e0c2e438a) Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2007-2242

Description The scan detected that the host is missing the following update: FreeBSD -- IPv6 Routing Header 0 is dangerous (275b845e-f56c-11db-8163-000e0c2e438a)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/275b845e-f56c-11db-8163-000e0c2e438a.html

Affected packages: 6.2 <= FreeBSD < 6.2_4 6.1 <= FreeBSD < 6.1_16 5.5 <= FreeBSD < 5.5_12

82228 - FreeBSD bind Multiple Denial Of Service Vulnerabilities (3cb6f059-c69d-11db-9f82-000e0c2e438a)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2007-0493, CVE-2007-0494

Description The scan detected that the host is missing the following update: bind -- Multiple Denial of Service vulnerabilities (3cb6f059-c69d-11db-9f82-000e0c2e438a)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/3cb6f059-c69d-11db-9f82-000e0c2e438a.html

Affected packages: named < 9.3.4 6.2 <= FreeBSD < 6.2_1 6.1 <= FreeBSD < 6.1_13 5.5 <= FreeBSD < 5.5_11

82229 - FreeBSD FreeBSD Jail Rc.d script Privilege Escalation (46b922a8-c69c-11db-9f82-000e0c2e438a)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2007-0166

Description The scan detected that the host is missing the following update: FreeBSD -- Jail rc.d script privilege escalation (46b922a8-c69c-11db-9f82-000e0c2e438a)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/46b922a8-c69c-11db-9f82-000e0c2e438a.html Affected packages: 6.1 <= FreeBSD < 6.1_12 6.0 <= FreeBSD < 6.0_17 5.5 <= FreeBSD < 5.5_15

82233 - FreeBSD openSSL Multiple Problems In Crypto(3) (0f37d765-c5d4-11db-9f82-000e0c2e438a)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2006-2937, CVE-2006-2938, CVE-2006-2940, CVE-2006-3738, CVE-2006-4343

Description The scan detected that the host is missing the following update: OpenSSL -- Multiple problems in crypto(3) (0f37d765-c5d4-11db-9f82-000e0c2e438a)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/0f37d765-c5d4-11db-9f82-000e0c2e438a.html

Affected packages: openssl < 0.9.7l_0 0.9.8 < openssl < 0.9.8d_0 6.1 <= FreeBSD < 6.1_9 6.0 <= FreeBSD < 6.0_14 5.5 <= FreeBSD < 5.5_7 5.4 <= FreeBSD < 5.4_21 5.3 <= FreeBSD < 5.3_36 4.11 <= FreeBSD < 4.11_24

82249 - FreeBSD gzip Multiple Vulnerabilities (11a84092-8f9f-11db-ab33-000e0c2e438a)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2006-4334, CVE-2006-4335, CVE-2006-4336, CVE-2006-4337, CVE-2006-4338

Description The scan detected that the host is missing the following update: gzip -- multiple vulnerabilities (11a84092-8f9f-11db-ab33-000e0c2e438a)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/11a84092-8f9f-11db-ab33-000e0c2e438a.html

Affected packages: 6.1 <= FreeBSD < 6.1_7 6.0 <= FreeBSD < 6.0_12 5.5 <= FreeBSD < 5.5_5 5.4 <= FreeBSD < 5.4_19 5.3 <= FreeBSD < 5.3_34 FreeBSD < 4.11_22 gzip < 1.3.12

82251 - FreeBSD openssl Incorrect PKCS#1 V1.5 Padding Validation In Crypto(3) (077c2dca-8f9a-11db-ab33- 000e0c2e438a)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2006-4339

Description The scan detected that the host is missing the following update: openssl -- Incorrect PKCS#1 v1.5 padding validation in crypto(3) (077c2dca-8f9a-11db-ab33-000e0c2e438a)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/077c2dca-8f9a-11db-ab33-000e0c2e438a.html

Affected packages: 6.1 <= FreeBSD < 6.1_6 6.0 <= FreeBSD < 6.0_11 5.5 <= FreeBSD < 5.5_4 5.4 <= FreeBSD < 5.4_18 5.3 <= FreeBSD < 5.3_33 FreeBSD < 4.11_21 0.9.8 < openssl < 0.9.8c_9 openssl < 0.9.7k_0

82427 - FreeBSD nfs Remote Denial Of Service (6111ecb8-b20d-11da-b2fb-000e0c2e438a)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2006-0900

Description The scan detected that the host is missing the following update: nfs -- remote denial of service (6111ecb8-b20d-11da-b2fb-000e0c2e438a)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/6111ecb8-b20d-11da-b2fb-000e0c2e438a.html

Affected packages: 6.0 <= FreeBSD < 6.0_5 5.4 <= FreeBSD < 5.4_12 5.3 <= FreeBSD < 5.3_27 4.11 <= FreeBSD < 4.11_15 4.10 <= FreeBSD < 4.10_21

82428 - FreeBSD openssh Remote Denial Of Service (6a308e8e-b1b4-11da-b2fb-000e0c2e438a)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2006-0883

Description The scan detected that the host is missing the following update: openssh -- remote denial of service (6a308e8e-b1b4-11da-b2fb-000e0c2e438a)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/6a308e8e-b1b4-11da-b2fb-000e0c2e438a.html

Affected packages: 5.4 <= FreeBSD < 5.4_12 5.3 <= FreeBSD < 5.3_27

82454 - FreeBSD FreeBSD Local Kernel Memory Disclosure (7a4f2aca-9d40-11da-8c1d-000e0c2e438a)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2006-0379, CVE-2006-0380

Description The scan detected that the host is missing the following update: FreeBSD -- Local kernel memory disclosure (7a4f2aca-9d40-11da-8c1d-000e0c2e438a)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/7a4f2aca-9d40-11da-8c1d-000e0c2e438a.html

Affected packages: 6.0 <= FreeBSD < 6.0_4

130555 - Debian Linux 8.0 DSA-3639-1 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> Debian Patches and Hotfixes Risk Level: Medium CVE: CVE-2015-8834, CVE-2016-5832, CVE-2016-5834, CVE-2016-5835, CVE-2016-5837, CVE-2016-5838, CVE-2016-5839

Description The scan detected that the host is missing the following update: DSA-3639-1

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.debian.org/security/2016/dsa-3639

Debian 8.0 all wordpress_4.1+dfsg-1+deb8u9

130557 - Debian Linux 8.0 DSA-3643-1 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> Debian Patches and Hotfixes Risk Level: Medium CVE: CVE-2016-6232 Description The scan detected that the host is missing the following update: DSA-3643-1

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.debian.org/security/2016/dsa-3643

Debian 8.0 all libkprintutils4_4:4.14.2-5+deb8u1 kdelibs5-plugins_4:4.14.2-5+deb8u1 libkdeui5_4:4.14.2-5+deb8u1 libknotifyconfig4_4:4.14.2-5+deb8u1 libkde3support4_4:4.14.2-5+deb8u1 libthreadweaver4_4:4.14.2-5+deb8u1 libplasma3_4:4.14.2-5+deb8u1 libkdecore5_4:4.14.2-5+deb8u1 libkcmutils4_4:4.14.2-5+deb8u1 libkjsapi4_4:4.14.2-5+deb8u1 kdelibs5-dbg_4:4.14.2-5+deb8u1 libkjsembed4_4:4.14.2-5+deb8u1 libkdeclarative5_4:4.14.2-5+deb8u1 kdelibs5-data_4:4.14.2-5+deb8u1 libnepomuk4_4:4.14.2-5+deb8u1 libktexteditor4_4:4.14.2-5+deb8u1 libkdewebkit5_4:4.14.2-5+deb8u1 kdoctools_4:4.14.2-5+deb8u1 libkimproxy4_4:4.14.2-5+deb8u1 libkfile4_4:4.14.2-5+deb8u1 libkunitconversion4_4:4.14.2-5+deb8u1 libsolid4_4:4.14.2-5+deb8u1 libkdesu5_4:4.14.2-5+deb8u1 libkmediaplayer4_4:4.14.2-5+deb8u1 libkrosscore4_4:4.14.2-5+deb8u1 libkio5_4:4.14.2-5+deb8u1 libkdnssd4_4:4.14.2-5+deb8u1 libkpty4_4:4.14.2-5+deb8u1 libnepomukquery4a_4:4.14.2-5+deb8u1 libkhtml5_4:4.14.2-5+deb8u1 libkntlm4_4:4.14.2-5+deb8u1 libkemoticons4_4:4.14.2-5+deb8u1 libkparts4_4:4.14.2-5+deb8u1 libknewstuff3-4_4:4.14.2-5+deb8u1 libknewstuff2-4_4:4.14.2-5+deb8u1 libkrossui4_4:4.14.2-5+deb8u1 libnepomukutils4_4:4.14.2-5+deb8u1 kdelibs5-dev_4:4.14.2-5+deb8u1 kdelibs-bin_4:4.14.2-5+deb8u1 libkutils4_4:4.14.2-5+deb8u1 libkidletime4_4:4.14.2-5+deb8u1

160129 - CentOS 6 CESA-2016-1573 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> Cent OS Patches and Hotfixes Risk Level: Medium CVE: CVE-2016-5408

Description The scan detected that the host is missing the following update: CESA-2016-1573

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.centos.org/pipermail/centos-announce/2016-August/022029.html

CentOS 6 x86_64 squid-3.1.23-16.el6_8.6 i686 squid-3.1.23-16.el6_8.6

163133 - Oracle Enterprise Linux ELSA-2016-1573 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> Oracle Enterprise Linux Patches and Hotfixes Risk Level: Medium CVE: CVE-2016-5408

Description The scan detected that the host is missing the following update: ELSA-2016-1573

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://oss.oracle.com/pipermail/el-errata/2016-August/006253.html

OEL6 x86_64 squid-3.1.23-16.el6_8.6 i386 squid-3.1.23-16.el6_8.6

174995 - Scientific Linux Security ERRATA Moderate: golang on SL7.x x86_64 (1608-3880)

Category: SSH Module -> NonIntrusive -> Scientific Linux Patches and HotFixes Risk Level: Medium CVE: CVE-2016-5386

Description The scan detected that the host is missing the following update: Security ERRATA Moderate: golang on SL7.x x86_64 (1608-3880)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://listserv.fnal.gov/scripts/wa.exe?A2=ind1608&L=scientific-linux-errata&F=&S=&P=3880

SL7 x86_64 golang-1.6.3-1.el7_2.1 golang-bin-1.6.3-1.el7_2.1 noarch golang-tests-1.6.3-1.el7_2.1 golang-docs-1.6.3-1.el7_2.1 golang-src-1.6.3-1.el7_2.1 golang-misc-1.6.3-1.el7_2.1

132269 - Oracle VM OVMSA-2016-0095 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> Oracle VM Patches and Hotfixes Risk Level: Medium CVE: CVE-2016-4470

Description The scan detected that the host is missing the following update: OVMSA-2016-0095

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://oss.oracle.com/pipermail/oraclevm-errata/2016-August/000511.html

OVM3.3 x86_64 kernel-uek-firmware-3.8.13-118.9.2.el6uek kernel-uek-3.8.13-118.9.2.el6uek

141243 - Red Hat Enterprise Linux RHSA-2016-1585 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> Red Hat Enterprise Linux Patches and Hotfixes Risk Level: Medium CVE: CVE-2016-5403

Description The scan detected that the host is missing the following update: RHSA-2016-1585

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://rhn.redhat.com/errata/RHSA-2016-1585.html

RHEL6D x86_64 qemu-guest-agent-0.12.1.2-2.491.el6_8.3 qemu-img-0.12.1.2-2.491.el6_8.3 qemu-kvm-0.12.1.2-2.491.el6_8.3 qemu-kvm-debuginfo-0.12.1.2-2.491.el6_8.3 qemu-kvm-tools-0.12.1.2-2.491.el6_8.3 i386 qemu-kvm-debuginfo-0.12.1.2-2.491.el6_8.3 qemu-guest-agent-0.12.1.2-2.491.el6_8.3

RHEL6S i386 qemu-kvm-debuginfo-0.12.1.2-2.491.el6_8.3 qemu-guest-agent-0.12.1.2-2.491.el6_8.3 x86_64 qemu-guest-agent-0.12.1.2-2.491.el6_8.3 qemu-img-0.12.1.2-2.491.el6_8.3 qemu-kvm-0.12.1.2-2.491.el6_8.3 qemu-kvm-debuginfo-0.12.1.2-2.491.el6_8.3 qemu-kvm-tools-0.12.1.2-2.491.el6_8.3

RHEL6WS x86_64 qemu-guest-agent-0.12.1.2-2.491.el6_8.3 qemu-img-0.12.1.2-2.491.el6_8.3 qemu-kvm-0.12.1.2-2.491.el6_8.3 qemu-kvm-debuginfo-0.12.1.2-2.491.el6_8.3 qemu-kvm-tools-0.12.1.2-2.491.el6_8.3 i386 qemu-kvm-debuginfo-0.12.1.2-2.491.el6_8.3 qemu-guest-agent-0.12.1.2-2.491.el6_8.3

144787 - SuSE SLES 11 SP4 SUSE-SU-2016:1944-1 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: Medium CVE: CVE-2016-5008

Description The scan detected that the host is missing the following update: SUSE-SU-2016:1944-1

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.suse.com/pipermail/sle-security-updates/2016-August/002174.html

SuSE SLES 11 SP4 i586 libvirt-doc-1.2.5-15.3 libvirt-lock-sanlock-1.2.5-15.3 perl-Sys-Virt-1.2.5-4.2 libvirt-client-1.2.5-15.3 libvirt-1.2.5-15.3 x86_64 libvirt-lock-sanlock-1.2.5-15.3 libvirt-client-1.2.5-15.3 perl-Sys-Virt-1.2.5-4.2 libvirt-doc-1.2.5-15.3 libvirt-1.2.5-15.3 libvirt-client-32bit-1.2.5-15.3

163134 - Oracle Enterprise Linux ELSA-2016-3592 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> Oracle Enterprise Linux Patches and Hotfixes Risk Level: Medium CVE: CVE-2016-4470

Description The scan detected that the host is missing the following update: ELSA-2016-3592

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://oss.oracle.com/pipermail/el-errata/2016-August/006259.html http://oss.oracle.com/pipermail/el-errata/2016-August/006258.html

OEL5 x86_64 kernel-uek-doc-2.6.39-400.283.2.el5uek kernel-uek-firmware-2.6.39-400.283.2.el5uek kernel-uek-debug-devel-2.6.39-400.283.2.el5uek kernel-uek-debug-2.6.39-400.283.2.el5uek kernel-uek-devel-2.6.39-400.283.2.el5uek kernel-uek-2.6.39-400.283.2.el5uek i386 kernel-uek-doc-2.6.39-400.283.2.el5uek kernel-uek-firmware-2.6.39-400.283.2.el5uek kernel-uek-debug-2.6.39-400.283.2.el5uek kernel-uek-devel-2.6.39-400.283.2.el5uek kernel-uek-debug-devel-2.6.39-400.283.2.el5uek kernel-uek-2.6.39-400.283.2.el5uek

OEL6 x86_64 kernel-uek-firmware-2.6.39-400.283.2.el6uek kernel-uek-debug-devel-2.6.39-400.283.2.el6uek kernel-uek-2.6.39-400.283.2.el6uek kernel-uek-doc-2.6.39-400.283.2.el6uek kernel-uek-devel-2.6.39-400.283.2.el6uek kernel-uek-debug-2.6.39-400.283.2.el6uek i386 kernel-uek-firmware-2.6.39-400.283.2.el6uek kernel-uek-debug-devel-2.6.39-400.283.2.el6uek kernel-uek-2.6.39-400.283.2.el6uek kernel-uek-doc-2.6.39-400.283.2.el6uek kernel-uek-devel-2.6.39-400.283.2.el6uek kernel-uek-debug-2.6.39-400.283.2.el6uek

163135 - Oracle Enterprise Linux ELSA-2016-3591 Update Is Not Installed Category: SSH Module -> NonIntrusive -> Oracle Enterprise Linux Patches and Hotfixes Risk Level: Medium CVE: CVE-2016-4470

Description The scan detected that the host is missing the following update: ELSA-2016-3591

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://oss.oracle.com/pipermail/el-errata/2016-August/006256.html http://oss.oracle.com/pipermail/el-errata/2016-August/006257.html

OEL7 x86_64 kernel-uek-firmware-3.8.13-118.9.2.el7uek dtrace-modules-3.8.13-118.9.2.el7uek-0.4.5-3.el7 kernel-uek-3.8.13-118.9.2.el7uek kernel-uek-debug-3.8.13-118.9.2.el7uek kernel-uek-doc-3.8.13-118.9.2.el7uek kernel-uek-devel-3.8.13-118.9.2.el7uek kernel-uek-debug-devel-3.8.13-118.9.2.el7uek

OEL6 x86_64 kernel-uek-debug-devel-3.8.13-118.9.2.el6uek kernel-uek-devel-3.8.13-118.9.2.el6uek dtrace-modules-3.8.13-118.9.2.el6uek-0.4.5-3.el6 kernel-uek-3.8.13-118.9.2.el6uek kernel-uek-firmware-3.8.13-118.9.2.el6uek kernel-uek-doc-3.8.13-118.9.2.el6uek kernel-uek-debug-3.8.13-118.9.2.el6uek

182042 - FreeBSD p5-XSLoader Local Arbitrary Code Execution (3e08047f-5a6c-11e6-a6c3-14dae9d210b8)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2016-6185

Description The scan detected that the host is missing the following update: p5-XSLoader -- local arbitrary code execution (3e08047f-5a6c-11e6-a6c3-14dae9d210b8)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/3e08047f-5a6c-11e6-a6c3-14dae9d210b8.html

Affected packages: p5-XSLoader < 0.22 5.18 <= perl5 < 5.18.99 5.18 <= perl5.18 < 5.18.99 5.18 <= perl5.20 < 5.18.99 5.18 <= perl5.22 < 5.18.99 5.18 <= perl5.24 < 5.18.99 5.20 <= perl5 < 5.20.99 5.20 <= perl5.18 < 5.20.99 5.20 <= perl5.20 < 5.20.99 5.20 <= perl5.22 < 5.20.99 5.20 <= perl5.24 < 5.20.99 5.22 <= perl5 < 5.22.3 5.22 <= perl5.18 < 5.22.3 5.22 <= perl5.20 < 5.22.3 5.22 <= perl5.22 < 5.22.3 5.22 <= perl5.24 < 5.22.3 5.24 <= perl5 < 5.24.1 5.24 <= perl5.18 < 5.24.1 5.24 <= perl5.20 < 5.24.1 5.24 <= perl5.22 < 5.24.1 5.24 <= perl5.24 < 5.24.1 perl5-devel <= 5.25.2.44

182045 - FreeBSD bind Denial Of Service Vulnerability (7a31e0de-5b6d-11e6-b334-002590263bf5)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2016-2775

Description The scan detected that the host is missing the following update: bind -- denial of service vulnerability (7a31e0de-5b6d-11e6-b334-002590263bf5)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/7a31e0de-5b6d-11e6-b334-002590263bf5.html

Affected packages: bind99 < 9.9.9P2 bind910 < 9.10.4P2 bind911 < 9.11.0.b2 bind9-devel < 9.12.0.a.2016.07.14

185372 - Ubuntu Linux 12.04, 14.04, 16.04 USN-3047-1 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> Ubuntu Patches and Hotfixes Risk Level: Medium CVE: CVE-2016-4439, CVE-2016-4441, CVE-2016-4453, CVE-2016-4454, CVE-2016-4952, CVE-2016-5105, CVE-2016-5106, CVE- 2016-5107, CVE-2016-5126, CVE-2016-5238, CVE-2016-5337, CVE-2016-5338, CVE-2016-5403, CVE-2016-6351

Description The scan detected that the host is missing the following update: USN-3047-1

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-August/003516.html

Ubuntu 12.04 qemu-kvm_1.0+noroms-0ubuntu14.29

Ubuntu 16.04 qemu-system-arm_2.5+dfsg-5ubuntu10.3 qemu-system-s390x_2.5+dfsg-5ubuntu10.3 qemu-system-ppc_2.5+dfsg-5ubuntu10.3 qemu-system-mips_2.5+dfsg-5ubuntu10.3 qemu-system-aarch64_2.5+dfsg-5ubuntu10.3 qemu-system_2.5+dfsg-5ubuntu10.3 qemu-system-misc_2.5+dfsg-5ubuntu10.3 qemu-system-x86_2.5+dfsg-5ubuntu10.3 qemu-system-sparc_2.5+dfsg-5ubuntu10.3

Ubuntu 14.04 qemu-system-arm_2.0.0+dfsg-2ubuntu1.26 qemu-system_2.0.0+dfsg-2ubuntu1.26 qemu-system-x86_2.0.0+dfsg-2ubuntu1.26 qemu-system-ppc_2.0.0+dfsg-2ubuntu1.26 qemu-system-misc_2.0.0+dfsg-2ubuntu1.26 qemu-system-mips_2.0.0+dfsg-2ubuntu1.26 qemu-system-sparc_2.0.0+dfsg-2ubuntu1.26 qemu-system-aarch64_2.0.0+dfsg-2ubuntu1.26

82230 - FreeBSD gtar Name Mangling Symlink Vulnerability (44449bf7-c69b-11db-9f82-000e0c2e438a)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-2006-6097

Description The scan detected that the host is missing the following update: gtar -- name mangling symlink vulnerability (44449bf7-c69b-11db-9f82-000e0c2e438a)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/44449bf7-c69b-11db-9f82-000e0c2e438a.html

Affected packages: 5.5 <= FreeBSD < 5.5_9 4.11 <= FreeBSD < 4.11_26

82231 - FreeBSD FreeBSD Kernel Memory Disclosure In Firewire(4) (5c554c0f-c69a-11db-9f82-000e0c2e438a)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-2006-6013

Description The scan detected that the host is missing the following update: FreeBSD -- Kernel memory disclosure in firewire(4) (5c554c0f-c69a-11db-9f82-000e0c2e438a)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/5c554c0f-c69a-11db-9f82-000e0c2e438a.html

Affected packages: 6.1 <= FreeBSD < 6.1_11 6.0 <= FreeBSD < 6.2_16 5.5 <= FreeBSD < 5.5_9 4.11 <= FreeBSD < 4.11_26

82452 - FreeBSD FreeBSD Infinite Loop In SACK Handling (dfb71c00-9d44-11da-8c1d-000e0c2e438a)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-2006-0433

Description The scan detected that the host is missing the following update: FreeBSD -- Infinite loop in SACK handling (dfb71c00-9d44-11da-8c1d-000e0c2e438a)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/dfb71c00-9d44-11da-8c1d-000e0c2e438a.html

Affected packages: 5.4 <= FreeBSD < 5.4_11 5.3 <= FreeBSD < 5.3_26

82598 - FreeBSD bzip2 Denial Of Service And permission Race Vulnerabilities (197f444f-e8ef-11d9-b875-0001020eed82)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-2005-0953, CVE-2005-1260

Description The scan detected that the host is missing the following update: bzip2 -- denial of service and permission race vulnerabilities (197f444f-e8ef-11d9-b875-0001020eed82)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/197f444f-e8ef-11d9-b875-0001020eed82.html

Affected packages: 5.4 <= FreeBSD < 5.4_3 5.* <= FreeBSD < 5.3_17 4.11 <= FreeBSD < 4.11_11 FreeBSD < 4.10_16 bzip2 < 1.0.3_1 88794 - Slackware Linux 14.1, 14.2 SSA:2016-219-02 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> Slackware Patches and Hotfixes Risk Level: Low CVE: CVE-MAP-NOMATCH

Description The scan detected that the host is missing the following update: SSA:2016-219-02

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.356201

Slackware 14.1 x86_64 mozilla-firefox-45.3.0esr-x86_64-1

Slackware 14.2 x86_64 mozilla-firefox-45.3.0esr-x86_64-1 i586 mozilla-firefox-45.3.0esr-i586-1

88796 - Slackware Linux 13.0, 13.1, 13.37, 14.0, 14.1, 14.2 SSA:2016-219-01 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> Slackware Patches and Hotfixes Risk Level: Low CVE: CVE-2016-5419, CVE-2016-5420, CVE-2016-5421

Description The scan detected that the host is missing the following update: SSA:2016-219-01

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.563059

Slackware 14.0 x86_64 curl-7.50.1-x86_64-1

Slackware 13.37 x86_64 curl-7.50.1-x86_64-1

Slackware 14.1 x86_64 curl-7.50.1-x86_64-1

Slackware 13.1 x86_64 curl-7.50.1-x86_64-1

Slackware 14.2 x86_64 curl-7.50.1-x86_64-1 i586 curl-7.50.1-i586-1

Slackware 13.0 x86_64 curl-7.50.1-x86_64-1

88797 - Slackware Linux 13.0, 13.1, 13.37, 14.0, 14.1, 14.2 SSA:2016-219-04 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> Slackware Patches and Hotfixes Risk Level: Low CVE: CVE-MAP-NOMATCH

Description The scan detected that the host is missing the following update: SSA:2016-219-04

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.535426

Slackware 14.0 x86_64 stunnel-5.35-x86_64-1

Slackware 13.37 x86_64 stunnel-5.35-x86_64-1

Slackware 14.1 x86_64 stunnel-5.35-x86_64-1

Slackware 13.1 x86_64 stunnel-5.35-x86_64-1

Slackware 14.2 x86_64 stunnel-5.35-x86_64-1 i586 stunnel-5.35-i586-1

Slackware 13.0 x86_64 stunnel-5.35-x86_64-1 130556 - Debian Linux 8.0 DSA-3638-1 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> Debian Patches and Hotfixes Risk Level: Low CVE: CVE-2016-5419, CVE-2016-5420, CVE-2016-5421

Description The scan detected that the host is missing the following update: DSA-3638-1

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.debian.org/security/2016/dsa-3638

Debian 8.0 all curl_7.38.0-4+deb8u4

130558 - Debian Linux 8.0 DSA-3644-1 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> Debian Patches and Hotfixes Risk Level: Low CVE: CVE-2016-5384

Description The scan detected that the host is missing the following update: DSA-3644-1

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.debian.org/security/2016/dsa-3644

Debian 8.0 all fontconfig_2.11.0-6.3+deb8u1

144775 - SuSE Linux 13.2 openSUSE-SU-2016:1974-1 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: Low CVE: CVE-2016-6504, CVE-2016-6505, CVE-2016-6506, CVE-2016-6507, CVE-2016-6508, CVE-2016-6509, CVE-2016-6510, CVE- 2016-6511

Description The scan detected that the host is missing the following update: openSUSE-SU-2016:1974-1

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.opensuse.org/opensuse-updates/2016-08/msg00023.html

SuSE Linux 13.2 x86_64 wireshark-ui-qt-debuginfo-1.12.13-44.1 wireshark-ui-gtk-1.12.13-44.1 wireshark-debuginfo-1.12.13-44.1 wireshark-1.12.13-44.1 wireshark-ui-gtk-debuginfo-1.12.13-44.1 wireshark-devel-1.12.13-44.1 wireshark-ui-qt-1.12.13-44.1 wireshark-debugsource-1.12.13-44.1 i586 wireshark-ui-qt-debuginfo-1.12.13-44.1 wireshark-ui-gtk-1.12.13-44.1 wireshark-debuginfo-1.12.13-44.1 wireshark-1.12.13-44.1 wireshark-ui-gtk-debuginfo-1.12.13-44.1 wireshark-devel-1.12.13-44.1 wireshark-ui-qt-1.12.13-44.1 wireshark-debugsource-1.12.13-44.1

182036 - FreeBSD Lighttpd - Multiple Vulnerabilities (ef0033ad-5823-11e6-80cc-001517f335e2)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-MAP-NOMATCH

Description The scan detected that the host is missing the following update: lighttpd - multiple vulnerabilities (ef0033ad-5823-11e6-80cc-001517f335e2)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/ef0033ad-5823-11e6-80cc-001517f335e2.html

Affected packages: lighttpd < 1.4.41

182037 - FreeBSD wireshark Multiple Vulnerabilities (610101ea-5b6a-11e6-b334-002590263bf5)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-2016-6505, CVE-2016-6506, CVE-2016-6508, CVE-2016-6509, CVE-2016-6510, CVE-2016-6511, CVE-2016-6512, CVE- 2016-6513

Description The scan detected that the host is missing the following update: wireshark -- multiple vulnerabilities (610101ea-5b6a-11e6-b334-002590263bf5)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/610101ea-5b6a-11e6-b334-002590263bf5.html

Affected packages: wireshark < 2.0.5 wireshark-lite < 2.0.5 wireshark-qt5 < 2.0.5 tshark < 2.0.5 tshark-lite < 2.0.5

182038 - FreeBSD Vulnerabilities In Curl (e4bc70fc-5a2f-11e6-a1bc-589cfc0654e1)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-2016-5419, CVE-2016-5420, CVE-2016-5421

Description The scan detected that the host is missing the following update: Vulnerabilities in Curl (e4bc70fc-5a2f-11e6-a1bc-589cfc0654e1)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/e4bc70fc-5a2f-11e6-a1bc-589cfc0654e1.html

Affected packages: 7.32.0 <= curl < 7.50.1

182039 - FreeBSD moodle Multiple Vulnerabilities (3ddcb42b-5b78-11e6-b334-002590263bf5)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-2016-5012, CVE-2016-5013, CVE-2016-5014

Description The scan detected that the host is missing the following update: moodle -- multiple vulnerabilities (3ddcb42b-5b78-11e6-b334-002590263bf5)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/3ddcb42b-5b78-11e6-b334-002590263bf5.html

Affected packages: moodle28 <= 2.8.12 moodle29 < 2.9.7 moodle30 < 3.0.5 moodle31 < 3.1.1

182043 - FreeBSD gd Multiple Vulnerabilities (556d2286-5a51-11e6-a6c3-14dae9d210b8)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-2016-5766, CVE-2016-6128, CVE-2016-6132, CVE-2016-6207

Description The scan detected that the host is missing the following update: gd -- multiple vulnerabilities (556d2286-5a51-11e6-a6c3-14dae9d210b8)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/556d2286-5a51-11e6-a6c3-14dae9d210b8.html

Affected packages: gd < 2.2.3,1

182046 - FreeBSD collectd Network Plugin Heap Overflow (6da45e38-5b55-11e6-8859-000c292ee6b8)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-2016-6254

Description The scan detected that the host is missing the following update: collectd -- Network plugin heap overflow (6da45e38-5b55-11e6-8859-000c292ee6b8)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/6da45e38-5b55-11e6-8859-000c292ee6b8.html

Affected packages: collectd < 5.5.2

185371 - Ubuntu Linux 12.04, 14.04, 16.04 USN-3048-1 Update Is Not Installed

Category: SSH Module -> NonIntrusive -> Ubuntu Patches and Hotfixes Risk Level: Low CVE: CVE-2016-5419, CVE-2016-5420, CVE-2016-5421

Description The scan detected that the host is missing the following update: USN-3048-1

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-August/003519.html

Ubuntu 12.04 libcurl3_7.22.0-3ubuntu4.16 libcurl3-gnutls_7.22.0-3ubuntu4.16 libcurl3-nss_7.22.0-3ubuntu4.16

Ubuntu 16.04 libcurl3_7.47.0-1ubuntu2.1 libcurl3-gnutls_7.47.0-1ubuntu2.1 libcurl3-nss_7.47.0-1ubuntu2.1

Ubuntu 14.04 libcurl3-gnutls_7.35.0-1ubuntu2.8 libcurl3-nss_7.35.0-1ubuntu2.8 libcurl3_7.35.0-1ubuntu2.8

20421 - (HPSBUX03632) HP-UX Mail Server Sendmail Local Unauthorized Information Disclosure Vulnerability

Category: SSH Module -> NonIntrusive -> HP-UX Patches and Hotfixes Risk Level: Low CVE: CVE-2014-3956

Description An information disclosure vulnerability is present in some versions of HP-UX.

Observation HP-UX is a Unix-like operating system.

An information disclosure vulnerability is present in some versions of HP-UX. The flaw lies in sendmail. Successful exploitation could allow an attacker to obtain sensitive information.

82394 - FreeBSD FreeBSD FPU Information Disclosure (1fa4c9f1-cfca-11da-a672-000e0c2e438a)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-2006-1056

Description The scan detected that the host is missing the following update: FreeBSD -- FPU information disclosure (1fa4c9f1-cfca-11da-a672-000e0c2e438a)

Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/1fa4c9f1-cfca-11da-a672-000e0c2e438a.html

Affected packages: 6.0 <= FreeBSD < 6.0_7 5.4 <= FreeBSD < 5.4_14 5.3 <= FreeBSD < 5.3_29 5 <= FreeBSD < 5.3 4.11 <= FreeBSD < 4.11_17 4.10 <= FreeBSD < 4.10_23 FreeBSD < 4.10

ENHANCED CHECKS The following checks have been updated. Enhancements may include optimizations, changes that reflect new information on a vulnerability and anything else that improves upon an existing FSL check. 181933 - FreeBSD OpenSSL Multiple Vulnerabilities (01d729ca-1143-11e6-b55e-b499baebfeaf)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: High CVE: CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, CVE-2016-2108, CVE-2016-2109, CVE-2016-2176

Update Details FASLScript is updated

83111 - FreeBSD FreeBSD IPv6 Neighbor Discovery Protocol Routing Vulnerability (6b8cadce-db0b-11dd-aa56- 000bcdf0a03b)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: High CVE: CVE-2008-2476

Update Details FASLScript is updated

83986 - FreeBSD FreeBSD BIND Remote Denial Of Service (13031d98-9bd1-11e2-a7be-8c705af55518)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: High CVE: CVE-2013-2266

Update Details FASLScript is updated

181060 - FreeBSD bind Denial Of Service Vulnerability (7943e521-f648-11e2-8607-3c970e169bc2)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: High CVE: CVE-2013-4854

Update Details FASLScript is updated

181537 - FreeBSD OpenSSH MaxAuthTries Limit Bypass Via Duplicates In KbdInteractiveDevices (5b74a5bc-348f-11e5- ba05-c80aa9043978)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: High CVE: CVE-2015-5600

Update Details FASLScript is updated

83105 - FreeBSD FreeBSD Remote Kernel Panics On IPv6 Connections (2f794295-7b69-11dd-80ba-000bcdf0a03b) Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: High CVE: CVE-2008-3530

Update Details FASLScript is updated

83106 - FreeBSD FreeBSD Cross-site Request Forgery In Ftpd(8) (e9ecaceb-db0d-11dd-aa56-000bcdf0a03b)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: High CVE: CVE-2008-4247

Update Details FASLScript is updated

83172 - FreeBSD FreeBSD Amd64 Swapgs Local Privilege Escalation (6d4e4759-7b67-11dd-80ba-000bcdf0a03b)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: High CVE: CVE-2008-3890

Update Details FASLScript is updated

83959 - FreeBSD FreeBSD Glob (3) related resource exhaustion (3c90e093-7c6e-11e2-809b-6c626d99876c)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: High CVE: CVE-2010-2632

Update Details FASLScript is updated

181004 - FreeBSD FreeBSD NFS Remote Denial Of Service (e66a6e2f-b0d5-11e2-9164-0016e6dcb562)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: High CVE: CVE-2013-3266

Update Details FASLScript is updated

181041 - FreeBSD FreeBSD Privilege Escalation Via Mmap (abef280d-d829-11e2-b71c-8c705af55518)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: High CVE: CVE-2013-2171

Update Details FASLScript is updated 181278 - FreeBSD OpenSSL Multiple Vulnerabilities (03175e62-5494-11e4-9cc1-bc5ff4fb5e7b)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: High CVE: CVE-2014-3513, CVE-2014-3566, CVE-2014-3567, CVE-2014-3568

Update Details FASLScript is updated

181303 - FreeBSD bind Denial Of Service Vulnerability (ab3e98d9-8175-11e4-907d-d050992ecde8)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: High CVE: CVE-2014-8500, CVE-2014-8680

Update Details FASLScript is updated

181360 - FreeBSD OpenSSL Multiple Vulnerabilities (9d15355b-ce7c-11e4-9db0-d050992ecde8)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: High CVE: CVE-2015-0204, CVE-2015-0209, CVE-2015-0286, CVE-2015-0287, CVE-2015-0288, CVE-2015-0289, CVE-2015-0292, CVE- 2015-0293

Update Details FASLScript is updated

181440 - FreeBSD openssl Multiple Vulnerabilities (8305e215-1080-11e5-8ba2-000c2980a9f3)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: High CVE: CVE-2014-8176, CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791, CVE-2015-1792, CVE-2015-4000

Update Details CVE is updated FASLScript is updated

181484 - FreeBSD bind Denial Of Service Vulnerability (c93533a3-24f1-11e5-8b74-3c970e169bc2)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: High CVE: CVE-2015-4620

Update Details FASLScript is updated

181531 - FreeBSD bind Denial Of Service Vulnerability (731cdeaa-3564-11e5-9970-14dae9d210b8)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: High CVE: CVE-2015-5477

Update Details FASLScript is updated

181570 - FreeBSD OpenSSH PAM Vulnerabilities (2920c449-4850-11e5-825f-c80aa9043978)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: High CVE: CVE-2015-6563, CVE-2015-6564, CVE-2015-6565

Update Details FASLScript is updated

181586 - FreeBSD bind Denial Of Service Vulnerability (eaf3b255-5245-11e5-9ad8-14dae9d210b8)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: High CVE: CVE-2015-5722

Update Details FASLScript is updated

83128 - FreeBSD FreeBSD Nmount(2) Local Arbitrary Code Execution (7dbb7197-7b68-11dd-80ba-000bcdf0a03b)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2008-3531

Update Details FASLScript is updated

83209 - FreeBSD FreeBSD Arc4random(9) Predictable Sequence Vulnerability (5796858d-db0b-11dd-aa56-000bcdf0a03b)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2008-5162

Update Details FASLScript is updated

181085 - FreeBSD FreeBSD Insufficient Credential Checks In Network (2) (4d87d357-202c-11e3-be06-000c29ee3065)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2013-5691

Update Details FASLScript is updated

181774 - FreeBSD libarchive Multiple Vulnerabilities (7c63775e-be31-11e5-b5fe-002590263bf5) Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2013-0211, CVE-2015-2304

Update Details FASLScript is updated

181788 - FreeBSD bind Denial Of Service Vulnerability (b4578647-c12b-11e5-96d6-14dae9d210b8)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2015-8704

Update Details FASLScript is updated

83164 - FreeBSD FreeBSD Netgraph / Privilege Escalation (c702944a-db0f-11dd-aa56-000bcdf0a03b)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-MAP-NOMATCH

Update Details FASLScript is updated

181130 - FreeBSD openssl Multiple Vulnerabilities (5aaa257e-772d-11e3-a65a-3c970e169bc2)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2013-4353, CVE-2013-6449, CVE-2013-6450

Update Details FASLScript is updated

181132 - FreeBSD Ntpd DRDoS / Amplification Attack Using Ntpdc Monlist Command (3d95c9a7-7d5c-11e3-a8c1- 206a8a720317)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2013-5211

Update Details FASLScript is updated

181244 - FreeBSD OpenSSL Multiple Vulnerabilities (8aff07eb-1dbd-11e4-b6ba-3c970e169bc2)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2014-3505, CVE-2014-3506, CVE-2014-3507, CVE-2014-3508, CVE-2014-3509, CVE-2014-3510, CVE-2014-3511, CVE- 2014-3512, CVE-2014-5139 Update Details FASLScript is updated

181314 - FreeBSD OpenSSL Multiple Vulnerabilities (4e536c14-9791-11e4-977d-d050992ecde8)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2014-3569, CVE-2014-3570, CVE-2014-3571, CVE-2014-3572, CVE-2014-8275, CVE-2015-0204, CVE-2015-0205, CVE- 2015-0206

Update Details FASLScript is updated

181346 - FreeBSD bind Denial Of Service Vulnerability (58033a95-bba8-11e4-88ae-d050992ecde8)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2015-1349

Update Details FASLScript is updated

181700 - FreeBSD openssl Multiple Vulnerabilities (4c8d1d72-9b38-11e5-aece-d050996490d0)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2015-1794, CVE-2015-3193, CVE-2015-3194, CVE-2015-3195, CVE-2015-3196

Update Details FASLScript is updated

181705 - FreeBSD bind Multiple Vulnerabilities (a8ec4db7-a398-11e5-85e9-14dae9d210b8)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2015-3193, CVE-2015-8000, CVE-2015-8461

Update Details FASLScript is updated

181883 - FreeBSD openssh Command Injection When X11Forwarding Is Enabled (e4644df8-e7da-11e5-829d- c80aa9043978)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2016-3115

Update Details FASLScript is updated

181906 - FreeBSD bind Denial Of Service Vulnerability (cba246d2-f483-11e5-92ce-002590263bf5) Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2016-1286

Update Details FASLScript is updated

182025 - FreeBSD MySQL Multiple Vulnerabilities (ca5cb202-4f51-11e6-b2ec-b499baebfeaf)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2016-2105, CVE-2016-3424, CVE-2016-3440, CVE-2016-3452, CVE-2016-3459, CVE-2016-3471, CVE-2016-3477, CVE- 2016-3486, CVE-2016-3501, CVE-2016-3518, CVE-2016-3521, CVE-2016-3588, CVE-2016-3614, CVE-2016-3615, CVE-2016-5436, CVE-2016-5437, CVE-2016-5439, CVE-2016-5440, CVE-2016-5441, CVE-2016-5442, CVE-2016-5443, CVE-2016-5444

Update Details FASLScript is updated

181192 - FreeBSD OpenSSL Remote Data Injection / DoS (0b8d7194-ca88-11e3-9d8d-c80aa9043978)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2010-5298

Update Details FASLScript is updated

181198 - FreeBSD OpenSSL NULL Pointer Dereference / DoS (1959e847-d4f0-11e3-84b0-0018fe623f2b)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2014-0198

Update Details FASLScript is updated

181297 - FreeBSD unbound Can Be Tricked Into Following An Endless Series Of Delegations, This Consumes A Lot Of Resources (10d73529-7f4b-

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2014-8602

Update Details FASLScript is updated

181775 - FreeBSD openssh Information Disclosure (dfe0cdc1-baf2-11e5-863a-b499baebfeaf)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2016-0777, CVE-2016-0778 Update Details FASLScript is updated

181808 - FreeBSD openssl Multiple Vulnerabilities (3679fd10-c5d1-11e5-b85f-0018fe623f2b)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2015-3197, CVE-2016-0701

Update Details FASLScript is updated

181902 - FreeBSD bind Denial Of Service Vulnerability (c9075321-f483-11e5-92ce-002590263bf5)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2016-1285

Update Details FASLScript is updated

83311 - FreeBSD FreeBSD Pipe Race Conditions (90d2e58f-b25a-11de-8c83-02e0185f8d72)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-MAP-NOMATCH

Update Details FASLScript is updated

83313 - FreeBSD FreeBSD Devfs / VFS NULL Pointer Race Condition (50383bde-b25b-11de-8c83-02e0185f8d72)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-MAP-NOMATCH

Update Details FASLScript is updated

83455 - FreeBSD FreeBSD SSL Protocol Flaw (406779fd-ca3b-11df-aade-0050568f000c)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-MAP-NOMATCH

Update Details FASLScript is updated

83456 - FreeBSD FreeBSD ZFS ZIL Playback With Insecure Permissions (97f09f2f-ca3f-11df-aade-0050568f000c) Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-MAP-NOMATCH

Update Details FASLScript is updated

83457 - FreeBSD FreeBSD Improper Environment Sanitization In Rtld (1) (ad08d14b-ca3d-11df-aade-0050568f000c)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-MAP-NOMATCH

Update Details FASLScript is updated

83459 - FreeBSD FreeBSD Integer Overflow In Bzip2 Decompression (18dc48fe-ca42-11df-aade-0050568f000c)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-MAP-NOMATCH

Update Details FASLScript is updated

83461 - FreeBSD FreeBSD OPIE Off-by-one Stack Overflow (768cfe70-ca40-11df-aade-0050568f000c)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-MAP-NOMATCH

Update Details FASLScript is updated

83462 - FreeBSD FreeBSD BIND Named (8) cache poisoning with DNSSEC validation (e500b9bf-ca3e-11df-aade- 0050568f000c)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-MAP-NOMATCH

Update Details FASLScript is updated

83463 - FreeBSD FreeBSD Ntpd Mode 7 Denial Of Service (48103b0a-ca3f-11df-aade-0050568f000c)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-MAP-NOMATCH

Update Details FASLScript is updated

83465 - FreeBSD FreeBSD Lost Mbuf Flag Resulting In Data Corruption (7a09a8df-ca41-11df-aade-0050568f000c)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-MAP-NOMATCH

Update Details FASLScript is updated

83467 - FreeBSD FreeBSD Unvalidated Input In Nfsclient (0dc91089-ca41-11df-aade-0050568f000c)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-MAP-NOMATCH

Update Details FASLScript is updated

83468 - FreeBSD FreeBSD Insufficient Environment Sanitization In Jail (8) (f6eb2279-ca3f-11df-aade-0050568f000c)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-MAP-NOMATCH

Update Details FASLScript is updated

83469 - FreeBSD FreeBSD Inappropriate Directory Permissions In Freebsd-update (8) (6e87b696-ca3e-11df-aade- 0050568f000c)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-MAP-NOMATCH

Update Details FASLScript is updated

83577 - FreeBSD BIND Large RRSIG RRsets And Negative Caching DoS (1e1421f0-8d6f-11e0-89b4-001ec9578670)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-2011-1910

Update Details FASLScript is updated

83990 - FreeBSD FreeBSD OpenSSL Multiple Vulnerabilities (69bfc852-9bd0-11e2-a7be-8c705af55518)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-2013-0166, CVE-2013-0169

Update Details FASLScript is updated

181084 - FreeBSD FreeBSD Cross-mount Links Between Nullfs (5) mounts (b72bad1c-20ed-11e3-be06-000c29ee3065)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-2013-5710

Update Details FASLScript is updated

181646 - FreeBSD ntp 13 Low- And Medium-severity Vulnerabilities (c4a18a12-77fc-11e5-a687-206a8a720317)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-2015-7691, CVE-2015-7692, CVE-2015-7701, CVE-2015-7702, CVE-2015-7703, CVE-2015-7704, CVE-2015-7705, CVE- 2015-7848, CVE-2015-7849, CVE-2015-7850, CVE-2015-7851, CVE-2015-7852, CVE-2015-7853, CVE-2015-7854, CVE-2015-7855, CVE-2015-7871

Update Details FASLScript is updated

181765 - FreeBSD ntp Denial Of Service Vulnerability (4eae4f46-b5ce-11e5-8a2b-d050996490d0)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-2015-5300

Update Details FASLScript is updated

181931 - FreeBSD ntp Multiple Vulnerabilities (b2487d9a-0c30-11e6-acd0-d050996490d0)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-2015-7704, CVE-2015-8138, CVE-2016-1547, CVE-2016-1548, CVE-2016-1549, CVE-2016-1550, CVE-2016-1551, CVE- 2016-2516, CVE-2016-2517, CVE-2016-2518, CVE-2016-2519

Update Details FASLScript is updated

181133 - FreeBSD bind Denial Of Service Vulnerability (cb252f01-7c43-11e3-b0a6-005056a37f68)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-2014-0591 Update Details FASLScript is updated

181787 - FreeBSD ntp Multiple Vulnerabilities (5237f5d7-c020-11e5-b397-d050996490d0)

Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-2015-7973, CVE-2015-7974, CVE-2015-7975, CVE-2015-7976, CVE-2015-7977, CVE-2015-7978, CVE-2015-7979, CVE- 2015-8138, CVE-2015-8139, CVE-2015-8140, CVE-2015-8158

Update Details FASLScript is updated

HOW TO UPDATE

FS1000 APPLIANCE customers should follow the instructions for Enterprise/Professional customers, below. In addition, we strongly urge all appliance customers to authorize and install any Windows Update critical patches. The appliance will auto-download any critical updates but will wait for your explicit authorization before installing.

FOUNDSTONE ENTERPRISE and PROFESSIONAL customers may obtain these new scripts using the FSUpdate Utility by selecting "FoundScan Update" on the help menu. Make sure that you have a valid FSUpdate username and password. The new vulnerability scripts will be automatically included in your scans if you have selected that option by right-clicking the selected vulnerability category and checking the "Run New Checks" checkbox.

MANAGED SERVICE CUSTOMERS already have the newest update applied to their environment. The new vulnerability scripts will be automatically included when your scans are next scheduled, provided the Run New Scripts option has been turned on.

MCAFEE TECHNICAL SUPPORT

ServicePortal: https://mysupport.mcafee.com Multi-National Phone Support available here: http://www.mcafee.com/us/about/contact/index.html Non-US customers - Select your country from the list of Worldwide Offices.

This email may contain confidential and privileged material for the sole use of the intended recipient. Any review or distribution by others is strictly prohibited. If you are not the intended recipient please contact the sender and delete all copies.

Copyright 2016 McAfee, Inc. McAfee is a registered trademark of McAfee, Inc. and/or its affiliates