2016-JUL-14 FSL version 7.5.834
MCAFEE FOUNDSTONE FSL UPDATE
To better protect your environment McAfee has created this FSL check update for the Foundstone Product Suite. The following is a detailed summary of the new and updated checks included with this release.
NEW CHECKS
20245 - IBM WebSphere Application Server Apache Struts Multiple Vulnerabilities
Category: Windows Host Assessment -> Miscellaneous (CATEGORY REQUIRES CREDENTIALS) Risk Level: High CVE: CVE-2016-1181, CVE-2016-1182
Description Multiple vulnerabilities are present in some versions of IBM WebSphere Application Server.
Observation IBM WebSphere Application Server is a Java application server.
Multiple vulnerabilities are present in some versions of IBM WebSphere Application Server. The flaws lie in Apache Struts component. Successful exploitation could allow an attacker to execute arbitrary code.
144735 - SuSE Linux 13.1 openSUSE-SU-2016:1767-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2016-1952, CVE-2016-1953, CVE-2016-1954, CVE-2016-1955, CVE-2016-1956, CVE-2016-1957, CVE-2016-1960, CVE- 2016-1961, CVE-2016-1964, CVE-2016-1974, CVE-2016-1977, CVE-2016-2790, CVE-2016-2791, CVE-2016-2792, CVE-2016-2793, CVE-2016-2794, CVE-2016-2795, CVE-2016-2796, CVE-2016-2797, CVE-2016-2798, CVE-2016-2799, CVE-2016-2800, CVE-2016- 2801, CVE-2016-2802, CVE-2016-2806, CVE-2016-2807, CVE-2016-2815, CVE-2016-2818
Description The scan detected that the host is missing the following update: openSUSE-SU-2016:1767-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.opensuse.org/opensuse-updates/2016-07/msg00027.html
SuSE Linux 13.1 x86_64 MozillaThunderbird-buildsymbols-45.2-70.83.1 MozillaThunderbird-translations-other-45.2-70.83.1 MozillaThunderbird-debuginfo-45.2-70.83.1 MozillaThunderbird-debugsource-45.2-70.83.1 MozillaThunderbird-45.2-70.83.1 MozillaThunderbird-devel-45.2-70.83.1 MozillaThunderbird-translations-common-45.2-70.83.1 i586 MozillaThunderbird-buildsymbols-45.2-70.83.1 MozillaThunderbird-translations-other-45.2-70.83.1 MozillaThunderbird-debuginfo-45.2-70.83.1 MozillaThunderbird-debugsource-45.2-70.83.1 MozillaThunderbird-45.2-70.83.1 MozillaThunderbird-devel-45.2-70.83.1 MozillaThunderbird-translations-common-45.2-70.83.1
144736 - SuSE SLES 12 SP1 SUSE-SU-2016:1764-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2015-7566, CVE-2015-8550, CVE-2015-8551, CVE-2015-8552, CVE-2015-8709, CVE-2015-8785, CVE-2015-8812, CVE- 2015-8816, CVE-2016-0723, CVE-2016-2143, CVE-2016-2184, CVE-2016-2185, CVE-2016-2186, CVE-2016-2188, CVE-2016-2384, CVE-2016-2782, CVE-2016-3134, CVE-2016-3136, CVE-2016-3137, CVE-2016-3138, CVE-2016-3139, CVE-2016-3140, CVE-2016- 3156, CVE-2016-3689, CVE-2016-3707, CVE-2016-3951
Description The scan detected that the host is missing the following update: SUSE-SU-2016:1764-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.suse.com/pipermail/sle-security-updates/2016-July/002150.html
SuSE SLES 12 SP1 x86_64 kernel-rt-3.12.58-14.1 kernel-rt-debuginfo-3.12.58-14.1 kernel-rt-base-debuginfo-3.12.58-14.1 kernel-compute_debug-debuginfo-3.12.58-14.1 kernel-rt_debug-devel-3.12.58-14.1 kernel-compute-base-3.12.58-14.1 kernel-compute_debug-devel-debuginfo-3.12.58-14.1 kernel-rt-debugsource-3.12.58-14.1 kernel-compute-devel-3.12.58-14.1 kernel-rt-base-3.12.58-14.1 kernel-rt-devel-3.12.58-14.1 kernel-compute-base-debuginfo-3.12.58-14.1 kernel-compute-debuginfo-3.12.58-14.1 kernel-compute-debugsource-3.12.58-14.1 kernel-rt_debug-debugsource-3.12.58-14.1 kernel-compute_debug-debugsource-3.12.58-14.1 kernel-rt_debug-debuginfo-3.12.58-14.1 kernel-compute_debug-devel-3.12.58-14.1 kernel-rt_debug-devel-debuginfo-3.12.58-14.1 kernel-syms-rt-3.12.58-14.1 kernel-compute-3.12.58-14.1 noarch kernel-devel-rt-3.12.58-14.1 kernel-source-rt-3.12.58-14.1
144738 - SuSE SLES 11 SP4 SUSE-SU-2016:1785-1 Update Is Not Installed Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2014-3615, CVE-2014-3689, CVE-2014-9718, CVE-2015-3214, CVE-2015-5239, CVE-2015-5278, CVE-2015-5279, CVE- 2015-5745, CVE-2015-6855, CVE-2015-7295, CVE-2015-7549, CVE-2015-8504, CVE-2015-8558, CVE-2015-8613, CVE-2015-8619, CVE-2015-8743, CVE-2016-1568, CVE-2016-1714, CVE-2016-1922, CVE-2016-1981, CVE-2016-2198, CVE-2016-2538, CVE-2016- 2841, CVE-2016-2857, CVE-2016-2858, CVE-2016-3710, CVE-2016-3712, CVE-2016-4001, CVE-2016-4002, CVE-2016-4020, CVE- 2016-4037, CVE-2016-4439, CVE-2016-4441
Description The scan detected that the host is missing the following update: SUSE-SU-2016:1785-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html
SuSE SLES 11 SP4 i586 kvm-1.4.2-44.1 x86_64 kvm-1.4.2-44.1
144741 - SuSE Linux 13.2 openSUSE-SU-2016:1778-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2016-1952, CVE-2016-1953, CVE-2016-1954, CVE-2016-1955, CVE-2016-1956, CVE-2016-1957, CVE-2016-1960, CVE- 2016-1961, CVE-2016-1964, CVE-2016-1974, CVE-2016-1977, CVE-2016-2790, CVE-2016-2791, CVE-2016-2792, CVE-2016-2793, CVE-2016-2794, CVE-2016-2795, CVE-2016-2796, CVE-2016-2797, CVE-2016-2798, CVE-2016-2799, CVE-2016-2800, CVE-2016- 2801, CVE-2016-2802, CVE-2016-2806, CVE-2016-2807, CVE-2016-2815, CVE-2016-2818
Description The scan detected that the host is missing the following update: openSUSE-SU-2016:1778-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.opensuse.org/opensuse-updates/2016-07/msg00038.html
SuSE Linux 13.2 x86_64 MozillaThunderbird-translations-other-45.2-43.1 MozillaThunderbird-debuginfo-45.2-43.1 MozillaThunderbird-45.2-43.1 MozillaThunderbird-translations-common-45.2-43.1 MozillaThunderbird-debugsource-45.2-43.1 MozillaThunderbird-buildsymbols-45.2-43.1 MozillaThunderbird-devel-45.2-43.1 i586 MozillaThunderbird-translations-other-45.2-43.1 MozillaThunderbird-debuginfo-45.2-43.1 MozillaThunderbird-45.2-43.1 MozillaThunderbird-translations-common-45.2-43.1 MozillaThunderbird-debugsource-45.2-43.1 MozillaThunderbird-buildsymbols-45.2-43.1 MozillaThunderbird-devel-45.2-43.1
20317 - (SYM16-010) Symantec Endpoint Protection Multiple Vulnerabilities
Category: Windows Host Assessment -> Anti-Virus Software (CATEGORY REQUIRES CREDENTIALS) Risk Level: High CVE: CVE-2016-2207, CVE-2016-2209, CVE-2016-2210, CVE-2016-2211, CVE-2016-3644, CVE-2016-3645, CVE-2016-3646
Description Multiple vulnerabilities are present in some versions of Symantec Endpoint Protection.
Observation Symantec Endpoint Protection is an all-in-one antivirus software.
Multiple vulnerabilities are present in some versions of Symantec Endpoint Protection. The flaws lie in the Symantec Decomposer Engine. Successful exploitation could allow an attacker to cause a denial of service or perform remote code execution.
20327 - (HPSBGN03569) HPE OneView for VMware vCenter Information Disclosure Vulnerability
Category: Windows Host Assessment -> Miscellaneous (CATEGORY REQUIRES CREDENTIALS) Risk Level: High CVE: CVE-2014-3566, CVE-2016-0705, CVE-2016-0799, CVE-2016-0800, CVE-2016-2842
Description Multiple vulnerabilities are present in some versions of HPE OneView for VMware vCenter.
Observation HPE OneView for VMware vCenter manage HPE infrastructure using VMware solutions.
Multiple vulnerabilities are present in some versions of HPE OneView for VMware vCenter. The flaws lie in OpenSSL. Successful exploitation could allow an attacker to retrieve sensitive data or cause a denial of service condition.
178200 - Gentoo Linux GLSA-201607-02 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Gentoo Linux Patches and HotFixes Risk Level: High CVE: CVE-2014-8964, CVE-2015-5073, CVE-2015-8380, CVE-2015-8381, CVE-2015-8383, CVE-2015-8384, CVE-2015-8385, CVE- 2015-8386, CVE-2015-8387, CVE-2015-8388, CVE-2015-8389, CVE-2015-8390, CVE-2015-8391, CVE-2015-8392, CVE-2015-8393, CVE-2015-8394, CVE-2015-8395, CVE-2016-1283
Description The scan detected that the host is missing the following update: GLSA-201607-02
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://security.gentoo.org/glsa/201607-02
Affected packages: dev-libs/libpcre < 8.38-r1
185351 - Ubuntu Linux 12.04, 14.04, 15.10, 16.04 USN-3029-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Ubuntu Patches and Hotfixes Risk Level: High CVE: CVE-2016-2834
Description The scan detected that the host is missing the following update: USN-3029-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-July/003496.html
Ubuntu 12.04 libnss3_3.23-0ubuntu0.12.04.1
Ubuntu 16.04 libnss3_3.23-0ubuntu0.16.04.1
Ubuntu 15.10 libnss3_3.23-0ubuntu0.15.10.1
Ubuntu 14.04 libnss3_3.23-0ubuntu0.14.04.1
141220 - Red Hat Enterprise Linux RHSA-2016-1406 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Red Hat Enterprise Linux Patches and Hotfixes Risk Level: High CVE: CVE-2016-4565
Description The scan detected that the host is missing the following update: RHSA-2016-1406
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.redhat.com/archives/enterprise-watch-list/2016-July/msg00005.html RHEL6D i386 kernel-debug-2.6.32-642.3.1.el6 kernel-devel-2.6.32-642.3.1.el6 kernel-debug-debuginfo-2.6.32-642.3.1.el6 kernel-debug-devel-2.6.32-642.3.1.el6 kernel-debuginfo-2.6.32-642.3.1.el6 kernel-debuginfo-common-i686-2.6.32-642.3.1.el6 kernel-2.6.32-642.3.1.el6 perf-debuginfo-2.6.32-642.3.1.el6 kernel-headers-2.6.32-642.3.1.el6 perf-2.6.32-642.3.1.el6 python-perf-debuginfo-2.6.32-642.3.1.el6 python-perf-2.6.32-642.3.1.el6 noarch kernel-doc-2.6.32-642.3.1.el6 kernel-abi-whitelists-2.6.32-642.3.1.el6 kernel-firmware-2.6.32-642.3.1.el6 x86_64 perf-debuginfo-2.6.32-642.3.1.el6 kernel-debug-2.6.32-642.3.1.el6 python-perf-2.6.32-642.3.1.el6 kernel-debug-devel-2.6.32-642.3.1.el6 kernel-debuginfo-common-x86_64-2.6.32-642.3.1.el6 kernel-devel-2.6.32-642.3.1.el6 kernel-debuginfo-2.6.32-642.3.1.el6 kernel-2.6.32-642.3.1.el6 perf-2.6.32-642.3.1.el6 kernel-debuginfo-common-i686-2.6.32-642.3.1.el6 python-perf-debuginfo-2.6.32-642.3.1.el6 kernel-debug-debuginfo-2.6.32-642.3.1.el6 kernel-headers-2.6.32-642.3.1.el6
RHEL6S i386 kernel-debug-2.6.32-642.3.1.el6 kernel-devel-2.6.32-642.3.1.el6 kernel-debug-debuginfo-2.6.32-642.3.1.el6 kernel-debug-devel-2.6.32-642.3.1.el6 kernel-debuginfo-2.6.32-642.3.1.el6 kernel-debuginfo-common-i686-2.6.32-642.3.1.el6 kernel-2.6.32-642.3.1.el6 perf-debuginfo-2.6.32-642.3.1.el6 kernel-headers-2.6.32-642.3.1.el6 perf-2.6.32-642.3.1.el6 python-perf-debuginfo-2.6.32-642.3.1.el6 python-perf-2.6.32-642.3.1.el6 noarch kernel-doc-2.6.32-642.3.1.el6 kernel-abi-whitelists-2.6.32-642.3.1.el6 kernel-firmware-2.6.32-642.3.1.el6 x86_64 perf-debuginfo-2.6.32-642.3.1.el6 kernel-debug-2.6.32-642.3.1.el6 python-perf-2.6.32-642.3.1.el6 kernel-debug-devel-2.6.32-642.3.1.el6 kernel-debuginfo-common-x86_64-2.6.32-642.3.1.el6 kernel-devel-2.6.32-642.3.1.el6 kernel-debuginfo-2.6.32-642.3.1.el6 kernel-2.6.32-642.3.1.el6 perf-2.6.32-642.3.1.el6 kernel-debuginfo-common-i686-2.6.32-642.3.1.el6 python-perf-debuginfo-2.6.32-642.3.1.el6 kernel-debug-debuginfo-2.6.32-642.3.1.el6 kernel-headers-2.6.32-642.3.1.el6
RHEL6WS i386 kernel-debug-2.6.32-642.3.1.el6 kernel-devel-2.6.32-642.3.1.el6 kernel-debug-debuginfo-2.6.32-642.3.1.el6 kernel-debug-devel-2.6.32-642.3.1.el6 kernel-debuginfo-2.6.32-642.3.1.el6 kernel-debuginfo-common-i686-2.6.32-642.3.1.el6 kernel-2.6.32-642.3.1.el6 perf-debuginfo-2.6.32-642.3.1.el6 kernel-headers-2.6.32-642.3.1.el6 perf-2.6.32-642.3.1.el6 python-perf-debuginfo-2.6.32-642.3.1.el6 noarch kernel-doc-2.6.32-642.3.1.el6 kernel-abi-whitelists-2.6.32-642.3.1.el6 kernel-firmware-2.6.32-642.3.1.el6 x86_64 kernel-debug-2.6.32-642.3.1.el6 kernel-debuginfo-common-x86_64-2.6.32-642.3.1.el6 kernel-devel-2.6.32-642.3.1.el6 kernel-debug-debuginfo-2.6.32-642.3.1.el6 kernel-debug-devel-2.6.32-642.3.1.el6 kernel-debuginfo-2.6.32-642.3.1.el6 kernel-debuginfo-common-i686-2.6.32-642.3.1.el6 kernel-2.6.32-642.3.1.el6 perf-debuginfo-2.6.32-642.3.1.el6 kernel-headers-2.6.32-642.3.1.el6 perf-2.6.32-642.3.1.el6 python-perf-debuginfo-2.6.32-642.3.1.el6
144733 - SuSE Linux 13.1 openSUSE-SU-2016:1766-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-MAP-NOMATCH
Description The scan detected that the host is missing the following update: openSUSE-SU-2016:1766-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.opensuse.org/opensuse-updates/2016-07/msg00026.html SuSE Linux 13.1 x86_64 libircclient-doc-1.6-6.3.1 libircclient1-1.6-6.3.1 libircclient-devel-1.6-6.3.1 i586 libircclient-doc-1.6-6.3.1 libircclient1-1.6-6.3.1 libircclient-devel-1.6-6.3.1
144734 - SuSE Linux 13.2 openSUSE-SU-2016:1761-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2015-8935, CVE-2016-5766, CVE-2016-5767, CVE-2016-5768, CVE-2016-5769, CVE-2016-5770, CVE-2016-5771, CVE- 2016-5772, CVE-2016-5773
Description The scan detected that the host is missing the following update: openSUSE-SU-2016:1761-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.opensuse.org/opensuse-updates/2016-07/msg00023.html
SuSE Linux 13.2 i586 php5-suhosin-5.6.1-69.1 php5-xmlwriter-5.6.1-69.1 php5-mcrypt-debuginfo-5.6.1-69.1 php5-devel-5.6.1-69.1 php5-pcntl-5.6.1-69.1 php5-fileinfo-debuginfo-5.6.1-69.1 php5-shmop-debuginfo-5.6.1-69.1 apache2-mod_php5-debuginfo-5.6.1-69.1 php5-ftp-debuginfo-5.6.1-69.1 php5-sockets-5.6.1-69.1 php5-5.6.1-69.1 php5-ldap-5.6.1-69.1 php5-gmp-5.6.1-69.1 php5-snmp-debuginfo-5.6.1-69.1 php5-calendar-5.6.1-69.1 php5-sysvmsg-5.6.1-69.1 php5-pdo-5.6.1-69.1 php5-xsl-5.6.1-69.1 php5-curl-5.6.1-69.1 php5-ctype-5.6.1-69.1 php5-dom-debuginfo-5.6.1-69.1 php5-intl-debuginfo-5.6.1-69.1 php5-mssql-debuginfo-5.6.1-69.1 php5-suhosin-debuginfo-5.6.1-69.1 php5-openssl-5.6.1-69.1 php5-sysvsem-debuginfo-5.6.1-69.1 php5-mbstring-debuginfo-5.6.1-69.1 php5-gettext-debuginfo-5.6.1-69.1 php5-calendar-debuginfo-5.6.1-69.1 php5-exif-5.6.1-69.1 php5-sysvshm-5.6.1-69.1 php5-pspell-5.6.1-69.1 php5-ldap-debuginfo-5.6.1-69.1 php5-pdo-debuginfo-5.6.1-69.1 php5-curl-debuginfo-5.6.1-69.1 php5-pspell-debuginfo-5.6.1-69.1 php5-mbstring-5.6.1-69.1 php5-shmop-5.6.1-69.1 php5-tokenizer-debuginfo-5.6.1-69.1 php5-wddx-debuginfo-5.6.1-69.1 php5-tidy-debuginfo-5.6.1-69.1 php5-wddx-5.6.1-69.1 php5-xmlrpc-debuginfo-5.6.1-69.1 php5-sqlite-5.6.1-69.1 php5-sysvmsg-debuginfo-5.6.1-69.1 php5-enchant-5.6.1-69.1 php5-fileinfo-5.6.1-69.1 php5-sqlite-debuginfo-5.6.1-69.1 php5-pgsql-debuginfo-5.6.1-69.1 php5-bz2-debuginfo-5.6.1-69.1 php5-ftp-5.6.1-69.1 php5-zip-debuginfo-5.6.1-69.1 php5-fastcgi-5.6.1-69.1 php5-enchant-debuginfo-5.6.1-69.1 php5-firebird-debuginfo-5.6.1-69.1 php5-imap-5.6.1-69.1 php5-readline-5.6.1-69.1 php5-soap-5.6.1-69.1 php5-debugsource-5.6.1-69.1 php5-gd-debuginfo-5.6.1-69.1 php5-intl-5.6.1-69.1 php5-mcrypt-5.6.1-69.1 php5-odbc-debuginfo-5.6.1-69.1 php5-readline-debuginfo-5.6.1-69.1 php5-dom-5.6.1-69.1 php5-tokenizer-5.6.1-69.1 php5-imap-debuginfo-5.6.1-69.1 php5-firebird-5.6.1-69.1 php5-phar-debuginfo-5.6.1-69.1 php5-pgsql-5.6.1-69.1 apache2-mod_php5-5.6.1-69.1 php5-odbc-5.6.1-69.1 php5-zlib-5.6.1-69.1 php5-mssql-5.6.1-69.1 php5-gmp-debuginfo-5.6.1-69.1 php5-fastcgi-debuginfo-5.6.1-69.1 php5-sysvsem-5.6.1-69.1 php5-zlib-debuginfo-5.6.1-69.1 php5-fpm-5.6.1-69.1 php5-gettext-5.6.1-69.1 php5-posix-debuginfo-5.6.1-69.1 php5-sysvshm-debuginfo-5.6.1-69.1 php5-json-debuginfo-5.6.1-69.1 php5-bcmath-5.6.1-69.1 php5-dba-5.6.1-69.1 php5-gd-5.6.1-69.1 php5-xmlrpc-5.6.1-69.1 php5-ctype-debuginfo-5.6.1-69.1 php5-xsl-debuginfo-5.6.1-69.1 php5-exif-debuginfo-5.6.1-69.1 php5-tidy-5.6.1-69.1 php5-fpm-debuginfo-5.6.1-69.1 php5-iconv-5.6.1-69.1 php5-opcache-5.6.1-69.1 php5-sockets-debuginfo-5.6.1-69.1 php5-json-5.6.1-69.1 php5-phar-5.6.1-69.1 php5-xmlreader-5.6.1-69.1 php5-mysql-debuginfo-5.6.1-69.1 php5-dba-debuginfo-5.6.1-69.1 php5-pcntl-debuginfo-5.6.1-69.1 php5-iconv-debuginfo-5.6.1-69.1 php5-debuginfo-5.6.1-69.1 php5-openssl-debuginfo-5.6.1-69.1 php5-posix-5.6.1-69.1 php5-mysql-5.6.1-69.1 php5-snmp-5.6.1-69.1 php5-zip-5.6.1-69.1 php5-xmlwriter-debuginfo-5.6.1-69.1 php5-opcache-debuginfo-5.6.1-69.1 php5-bcmath-debuginfo-5.6.1-69.1 php5-xmlreader-debuginfo-5.6.1-69.1 php5-soap-debuginfo-5.6.1-69.1 php5-bz2-5.6.1-69.1 noarch php5-pear-5.6.1-69.1 x86_64 php5-suhosin-5.6.1-69.1 php5-xmlwriter-5.6.1-69.1 php5-mcrypt-debuginfo-5.6.1-69.1 php5-devel-5.6.1-69.1 php5-pcntl-5.6.1-69.1 php5-fileinfo-debuginfo-5.6.1-69.1 php5-shmop-debuginfo-5.6.1-69.1 apache2-mod_php5-debuginfo-5.6.1-69.1 php5-ftp-debuginfo-5.6.1-69.1 php5-sockets-5.6.1-69.1 php5-5.6.1-69.1 php5-ldap-5.6.1-69.1 php5-gmp-5.6.1-69.1 php5-snmp-debuginfo-5.6.1-69.1 php5-calendar-5.6.1-69.1 php5-sysvmsg-5.6.1-69.1 php5-pdo-5.6.1-69.1 php5-xsl-5.6.1-69.1 php5-curl-5.6.1-69.1 php5-ctype-5.6.1-69.1 php5-dom-debuginfo-5.6.1-69.1 php5-intl-debuginfo-5.6.1-69.1 php5-mssql-debuginfo-5.6.1-69.1 php5-suhosin-debuginfo-5.6.1-69.1 php5-openssl-5.6.1-69.1 php5-sysvsem-debuginfo-5.6.1-69.1 php5-mbstring-debuginfo-5.6.1-69.1 php5-gettext-debuginfo-5.6.1-69.1 php5-calendar-debuginfo-5.6.1-69.1 php5-exif-5.6.1-69.1 php5-sysvshm-5.6.1-69.1 php5-pspell-5.6.1-69.1 php5-ldap-debuginfo-5.6.1-69.1 php5-pdo-debuginfo-5.6.1-69.1 php5-curl-debuginfo-5.6.1-69.1 php5-pspell-debuginfo-5.6.1-69.1 php5-mbstring-5.6.1-69.1 php5-shmop-5.6.1-69.1 php5-tokenizer-debuginfo-5.6.1-69.1 php5-wddx-debuginfo-5.6.1-69.1 php5-tidy-debuginfo-5.6.1-69.1 php5-wddx-5.6.1-69.1 php5-xmlrpc-debuginfo-5.6.1-69.1 php5-sqlite-5.6.1-69.1 php5-sysvmsg-debuginfo-5.6.1-69.1 php5-enchant-5.6.1-69.1 php5-fileinfo-5.6.1-69.1 php5-sqlite-debuginfo-5.6.1-69.1 php5-pgsql-debuginfo-5.6.1-69.1 php5-bz2-debuginfo-5.6.1-69.1 php5-ftp-5.6.1-69.1 php5-zip-debuginfo-5.6.1-69.1 php5-fastcgi-5.6.1-69.1 php5-enchant-debuginfo-5.6.1-69.1 php5-firebird-debuginfo-5.6.1-69.1 php5-imap-5.6.1-69.1 php5-readline-5.6.1-69.1 php5-soap-5.6.1-69.1 php5-debugsource-5.6.1-69.1 php5-gd-debuginfo-5.6.1-69.1 php5-intl-5.6.1-69.1 php5-mcrypt-5.6.1-69.1 php5-odbc-debuginfo-5.6.1-69.1 php5-readline-debuginfo-5.6.1-69.1 php5-dom-5.6.1-69.1 php5-tokenizer-5.6.1-69.1 php5-imap-debuginfo-5.6.1-69.1 php5-firebird-5.6.1-69.1 php5-phar-debuginfo-5.6.1-69.1 php5-pgsql-5.6.1-69.1 apache2-mod_php5-5.6.1-69.1 php5-odbc-5.6.1-69.1 php5-zlib-5.6.1-69.1 php5-mssql-5.6.1-69.1 php5-gmp-debuginfo-5.6.1-69.1 php5-fastcgi-debuginfo-5.6.1-69.1 php5-sysvsem-5.6.1-69.1 php5-zlib-debuginfo-5.6.1-69.1 php5-fpm-5.6.1-69.1 php5-gettext-5.6.1-69.1 php5-posix-debuginfo-5.6.1-69.1 php5-sysvshm-debuginfo-5.6.1-69.1 php5-json-debuginfo-5.6.1-69.1 php5-bcmath-5.6.1-69.1 php5-dba-5.6.1-69.1 php5-gd-5.6.1-69.1 php5-xmlrpc-5.6.1-69.1 php5-ctype-debuginfo-5.6.1-69.1 php5-xsl-debuginfo-5.6.1-69.1 php5-exif-debuginfo-5.6.1-69.1 php5-tidy-5.6.1-69.1 php5-fpm-debuginfo-5.6.1-69.1 php5-iconv-5.6.1-69.1 php5-opcache-5.6.1-69.1 php5-sockets-debuginfo-5.6.1-69.1 php5-json-5.6.1-69.1 php5-phar-5.6.1-69.1 php5-xmlreader-5.6.1-69.1 php5-mysql-debuginfo-5.6.1-69.1 php5-dba-debuginfo-5.6.1-69.1 php5-pcntl-debuginfo-5.6.1-69.1 php5-iconv-debuginfo-5.6.1-69.1 php5-debuginfo-5.6.1-69.1 php5-openssl-debuginfo-5.6.1-69.1 php5-posix-5.6.1-69.1 php5-mysql-5.6.1-69.1 php5-snmp-5.6.1-69.1 php5-zip-5.6.1-69.1 php5-xmlwriter-debuginfo-5.6.1-69.1 php5-opcache-debuginfo-5.6.1-69.1 php5-bcmath-debuginfo-5.6.1-69.1 php5-xmlreader-debuginfo-5.6.1-69.1 php5-soap-debuginfo-5.6.1-69.1 php5-bz2-5.6.1-69.1
144737 - SuSE SLES 12 SP1, SLED 12 SP1 SUSE-SU-2016:1784-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2014-9805, CVE-2014-9806, CVE-2014-9807, CVE-2014-9808, CVE-2014-9809, CVE-2014-9810, CVE-2014-9811, CVE- 2014-9812, CVE-2014-9813, CVE-2014-9814, CVE-2014-9815, CVE-2014-9816, CVE-2014-9817, CVE-2014-9818, CVE-2014-9819, CVE-2014-9820, CVE-2014-9821, CVE-2014-9822, CVE-2014-9823, CVE-2014-9824, CVE-2014-9825, CVE-2014-9826, CVE-2014- 9828, CVE-2014-9829, CVE-2014-9830, CVE-2014-9831, CVE-2014-9832, CVE-2014-9833, CVE-2014-9834, CVE-2014-9835, CVE- 2014-9836, CVE-2014-9837, CVE-2014-9838, CVE-2014-9839, CVE-2014-9840, CVE-2014-9841, CVE-2014-9842, CVE-2014-9843, CVE-2014-9844, CVE-2014-9845, CVE-2014-9846, CVE-2014-9847, CVE-2014-9848, CVE-2014-9849, CVE-2014-9850, CVE-2014- 9851, CVE-2014-9852, CVE-2014-9853, CVE-2014-9854, CVE-2015-8894, CVE-2015-8895, CVE-2015-8896, CVE-2015-8897, CVE- 2015-8898, CVE-2015-8900, CVE-2015-8901, CVE-2015-8902, CVE-2015-8903, CVE-2016-4562, CVE-2016-4563, CVE-2016-4564, CVE-2016-5687, CVE-2016-5688, CVE-2016-5689, CVE-2016-5690, CVE-2016-5691, CVE-2016-5841, CVE-2016-5842
Description The scan detected that the host is missing the following update: SUSE-SU-2016:1784-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.suse.com/pipermail/sle-security-updates/2016-July/002153.html
SuSE SLES 12 SP1 x86_64 libMagickWand-6_Q16-1-debuginfo-6.8.8.1-30.2 ImageMagick-debugsource-6.8.8.1-30.2 ImageMagick-debuginfo-6.8.8.1-30.2 libMagickWand-6_Q16-1-6.8.8.1-30.2 libMagickCore-6_Q16-1-6.8.8.1-30.2 libMagickCore-6_Q16-1-debuginfo-6.8.8.1-30.2 SuSE SLED 12 SP1 x86_64 libMagick++-6_Q16-3-debuginfo-6.8.8.1-30.2 libMagickWand-6_Q16-1-debuginfo-6.8.8.1-30.2 libMagickCore-6_Q16-1-debuginfo-6.8.8.1-30.2 ImageMagick-debugsource-6.8.8.1-30.2 ImageMagick-debuginfo-6.8.8.1-30.2 libMagickWand-6_Q16-1-6.8.8.1-30.2 libMagick++-6_Q16-3-6.8.8.1-30.2 ImageMagick-6.8.8.1-30.2 libMagickCore-6_Q16-1-6.8.8.1-30.2 libMagickCore-6_Q16-1-32bit-6.8.8.1-30.2 libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-30.2
144739 - SuSE Linux 13.2 openSUSE-SU-2016:1748-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2014-9805, CVE-2014-9806, CVE-2014-9807, CVE-2014-9808, CVE-2014-9809, CVE-2014-9810, CVE-2014-9811, CVE- 2014-9812, CVE-2014-9813, CVE-2014-9814, CVE-2014-9815, CVE-2014-9816, CVE-2014-9817, CVE-2014-9818, CVE-2014-9819, CVE-2014-9820, CVE-2014-9821, CVE-2014-9822, CVE-2014-9823, CVE-2014-9824, CVE-2014-9825, CVE-2014-9826, CVE-2014- 9828, CVE-2014-9829, CVE-2014-9830, CVE-2014-9831, CVE-2014-9832, CVE-2014-9833, CVE-2014-9834, CVE-2014-9835, CVE- 2014-9836, CVE-2014-9837, CVE-2014-9838, CVE-2014-9839, CVE-2014-9840, CVE-2014-9841, CVE-2014-9842, CVE-2014-9843, CVE-2014-9844, CVE-2014-9845, CVE-2014-9846, CVE-2014-9847, CVE-2014-9848, CVE-2014-9849, CVE-2014-9850, CVE-2014- 9851, CVE-2014-9852, CVE-2014-9853, CVE-2014-9854, CVE-2015-8894, CVE-2015-8895, CVE-2015-8896, CVE-2015-8897, CVE- 2015-8898, CVE-2015-8900, CVE-2015-8901, CVE-2015-8902, CVE-2015-8903, CVE-2016-4562, CVE-2016-4563, CVE-2016-4564, CVE-2016-5687, CVE-2016-5688, CVE-2016-5689, CVE-2016-5690, CVE-2016-5691, CVE-2016-5841, CVE-2016-5842
Description The scan detected that the host is missing the following update: openSUSE-SU-2016:1748-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.opensuse.org/opensuse-updates/2016-07/msg00018.html
SuSE Linux 13.2 i586 ImageMagick-extra-debuginfo-6.8.9.8-26.1 ImageMagick-6.8.9.8-26.1 libMagick++-6_Q16-5-6.8.9.8-26.1 ImageMagick-devel-6.8.9.8-26.1 ImageMagick-extra-6.8.9.8-26.1 ImageMagick-debuginfo-6.8.9.8-26.1 libMagickWand-6_Q16-2-6.8.9.8-26.1 perl-PerlMagick-debuginfo-6.8.9.8-26.1 libMagickCore-6_Q16-2-6.8.9.8-26.1 libMagickWand-6_Q16-2-debuginfo-6.8.9.8-26.1 perl-PerlMagick-6.8.9.8-26.1 ImageMagick-debugsource-6.8.9.8-26.1 libMagick++-6_Q16-5-debuginfo-6.8.9.8-26.1 libMagickCore-6_Q16-2-debuginfo-6.8.9.8-26.1 libMagick++-devel-6.8.9.8-26.1 noarch ImageMagick-doc-6.8.9.8-26.1 x86_64 ImageMagick-extra-debuginfo-6.8.9.8-26.1 ImageMagick-6.8.9.8-26.1 libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 libMagick++-6_Q16-5-6.8.9.8-26.1 ImageMagick-devel-6.8.9.8-26.1 libMagickWand-6_Q16-2-debuginfo-32bit-6.8.9.8-26.1 ImageMagick-extra-6.8.9.8-26.1 ImageMagick-debuginfo-6.8.9.8-26.1 libMagickWand-6_Q16-2-6.8.9.8-26.1 ImageMagick-devel-32bit-6.8.9.8-26.1 libMagickCore-6_Q16-2-debuginfo-32bit-6.8.9.8-26.1 perl-PerlMagick-debuginfo-6.8.9.8-26.1 libMagickCore-6_Q16-2-6.8.9.8-26.1 libMagickWand-6_Q16-2-debuginfo-6.8.9.8-26.1 perl-PerlMagick-6.8.9.8-26.1 ImageMagick-debugsource-6.8.9.8-26.1 libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 libMagick++-devel-32bit-6.8.9.8-26.1 libMagick++-6_Q16-5-debuginfo-6.8.9.8-26.1 libMagickCore-6_Q16-2-debuginfo-6.8.9.8-26.1 libMagick++-devel-6.8.9.8-26.1 libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 libMagick++-6_Q16-5-debuginfo-32bit-6.8.9.8-26.1
144740 - SuSE SLES 11 SP4 SUSE-SU-2016:1782-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2014-9805, CVE-2014-9806, CVE-2014-9807, CVE-2014-9808, CVE-2014-9809, CVE-2014-9810, CVE-2014-9811, CVE- 2014-9812, CVE-2014-9813, CVE-2014-9814, CVE-2014-9815, CVE-2014-9816, CVE-2014-9817, CVE-2014-9818, CVE-2014-9819, CVE-2014-9820, CVE-2014-9822, CVE-2014-9823, CVE-2014-9824, CVE-2014-9826, CVE-2014-9828, CVE-2014-9829, CVE-2014- 9830, CVE-2014-9831, CVE-2014-9834, CVE-2014-9835, CVE-2014-9836, CVE-2014-9837, CVE-2014-9838, CVE-2014-9839, CVE- 2014-9840, CVE-2014-9842, CVE-2014-9844, CVE-2014-9845, CVE-2014-9846, CVE-2014-9847, CVE-2014-9849, CVE-2014-9851, CVE-2014-9853, CVE-2014-9854, CVE-2015-8894, CVE-2015-8896, CVE-2015-8897, CVE-2015-8898, CVE-2015-8901, CVE-2015- 8902, CVE-2015-8903, CVE-2016-4562, CVE-2016-4563, CVE-2016-4564, CVE-2016-5687, CVE-2016-5688, CVE-2016-5689, CVE- 2016-5690, CVE-2016-5691, CVE-2016-5841, CVE-2016-5842
Description The scan detected that the host is missing the following update: SUSE-SU-2016:1782-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.suse.com/pipermail/sle-security-updates/2016-July/002151.html
SuSE SLES 11 SP4 i586 libMagickCore1-6.4.3.6-7.45.1 x86_64 libMagickCore1-6.4.3.6-7.45.1 libMagickCore1-32bit-6.4.3.6-7.45.1 160118 - CentOS 6 CESA-2016-1406 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Cent OS Patches and Hotfixes Risk Level: High CVE: CVE-2016-4565
Description The scan detected that the host is missing the following update: CESA-2016-1406
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.centos.org/pipermail/centos-announce/2016-July/021977.html
CentOS 6 i686 kernel-debug-2.6.32-642.3.1.el6 kernel-headers-2.6.32-642.3.1.el6 kernel-debug-devel-2.6.32-642.3.1.el6 kernel-devel-2.6.32-642.3.1.el6 kernel-2.6.32-642.3.1.el6 python-perf-2.6.32-642.3.1.el6 perf-2.6.32-642.3.1.el6 noarch kernel-doc-2.6.32-642.3.1.el6 kernel-abi-whitelists-2.6.32-642.3.1.el6 kernel-firmware-2.6.32-642.3.1.el6 x86_64 kernel-debug-2.6.32-642.3.1.el6 kernel-headers-2.6.32-642.3.1.el6 kernel-debug-devel-2.6.32-642.3.1.el6 kernel-devel-2.6.32-642.3.1.el6 kernel-2.6.32-642.3.1.el6 python-perf-2.6.32-642.3.1.el6 perf-2.6.32-642.3.1.el6
163116 - Oracle Enterprise Linux ELSA-2016-1406 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Oracle Enterprise Linux Patches and Hotfixes Risk Level: High CVE: CVE-2016-4565
Description The scan detected that the host is missing the following update: ELSA-2016-1406
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://oss.oracle.com/pipermail/el-errata/2016-July/006194.html OEL6 x86_64 kernel-debug-2.6.32-642.3.1.el6 kernel-doc-2.6.32-642.3.1.el6 kernel-headers-2.6.32-642.3.1.el6 kernel-abi-whitelists-2.6.32-642.3.1.el6 kernel-devel-2.6.32-642.3.1.el6 kernel-2.6.32-642.3.1.el6 python-perf-2.6.32-642.3.1.el6 kernel-firmware-2.6.32-642.3.1.el6 perf-2.6.32-642.3.1.el6 kernel-debug-devel-2.6.32-642.3.1.el6 i386 kernel-debug-2.6.32-642.3.1.el6 kernel-doc-2.6.32-642.3.1.el6 kernel-headers-2.6.32-642.3.1.el6 kernel-abi-whitelists-2.6.32-642.3.1.el6 kernel-devel-2.6.32-642.3.1.el6 kernel-2.6.32-642.3.1.el6 python-perf-2.6.32-642.3.1.el6 kernel-firmware-2.6.32-642.3.1.el6 perf-2.6.32-642.3.1.el6 kernel-debug-devel-2.6.32-642.3.1.el6
178201 - Gentoo Linux GLSA-201607-01 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Gentoo Linux Patches and HotFixes Risk Level: High CVE: CVE-2014-6270, CVE-2016-2569, CVE-2016-2570, CVE-2016-2571, CVE-2016-2572, CVE-2016-3947, CVE-2016-3948, CVE- 2016-4051, CVE-2016-4052, CVE-2016-4053, CVE-2016-4054, CVE-2016-4553, CVE-2016-4554, CVE-2016-4555, CVE-2016-4556
Description The scan detected that the host is missing the following update: GLSA-201607-01
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://security.gentoo.org/glsa/201607-01
Affected packages: net-proxy/squid < 3.5.19
20251 - IBM WebSphere Application Server HTTP Response Splitting Vulnerability
Category: Windows Host Assessment -> Miscellaneous (CATEGORY REQUIRES CREDENTIALS) Risk Level: Medium CVE: CVE-2016-0359
Description A vulnerability is present in some versions of IBM WebSphere Application Server.
Observation IBM WebSphere Application Server is a Java EE application server.
A vulnerability is present in some versions of IBM WebSphere Application Server. The flaw lies in the HTTP server component. Successful exploitation could allow an attacker to conduct an HTTP response splitting attack allowing him to perform further attacks and possibly affect confidentiality.
20252 - IBM WebSphere Application Server Liberty Profile HTTP Response Splitting Vulnerability
Category: Windows Host Assessment -> Miscellaneous (CATEGORY REQUIRES CREDENTIALS) Risk Level: Medium CVE: CVE-2016-0359
Description A vulnerability is present in some versions of IBM WebSphere Application Server Liberty Profile.
Observation IBM WebSphere Application Liberty Profile Server is a Java EE application server.
A vulnerability is present in some versions of IBM WebSphere Application Server Liberty Profile. The flaw lies in the HTTP server component. Successful exploitation could allow an attacker to conduct an HTTP response splitting attack allowing him to perform further attacks and possibly affect confidentiality.
141219 - Red Hat Enterprise Linux RHSA-2016-1392 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Red Hat Enterprise Linux Patches and Hotfixes Risk Level: Medium CVE: CVE-2016-2818
Description The scan detected that the host is missing the following update: RHSA-2016-1392
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.redhat.com/archives/enterprise-watch-list/2016-July/msg00003.html
RHEL6S i386 thunderbird-debuginfo-45.2-1.el6_8 thunderbird-45.2-1.el6_8 x86_64 thunderbird-debuginfo-45.2-1.el6_8 thunderbird-45.2-1.el6_8
RHEL6WS x86_64 thunderbird-debuginfo-45.2-1.el6_8 thunderbird-45.2-1.el6_8 i386 thunderbird-debuginfo-45.2-1.el6_8 thunderbird-45.2-1.el6_8 RHEL5D x86_64 thunderbird-45.2-1.el5_11 thunderbird-debuginfo-45.2-1.el5_11 i386 thunderbird-45.2-1.el5_11 thunderbird-debuginfo-45.2-1.el5_11
RHEL7D x86_64 thunderbird-45.2-1.el7_2 thunderbird-debuginfo-45.2-1.el7_2
RHEL6D x86_64 thunderbird-debuginfo-45.2-1.el6_8 thunderbird-45.2-1.el6_8 i386 thunderbird-debuginfo-45.2-1.el6_8 thunderbird-45.2-1.el6_8
RHEL7WS x86_64 thunderbird-45.2-1.el7_2 thunderbird-debuginfo-45.2-1.el7_2
160119 - CentOS 5, 6, 7 CESA-2016-1392 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Cent OS Patches and Hotfixes Risk Level: Medium CVE: CVE-2016-2818
Description The scan detected that the host is missing the following update: CESA-2016-1392
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.centos.org/pipermail/centos-announce/2016-July/021956.html http://lists.centos.org/pipermail/centos-announce/2016-July/021955.html http://lists.centos.org/pipermail/centos-announce/2016-July/021959.html
CentOS 6 x86_64 thunderbird-45.2-1.el6.centos i686 thunderbird-45.2-1.el6.centos
CentOS 7 x86_64 thunderbird-45.2-1.el7.centos CentOS 5 x86_64 thunderbird-45.2-1.el5.centos i386 thunderbird-45.2-1.el5.centos
163115 - Oracle Enterprise Linux ELSA-2016-1392 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Oracle Enterprise Linux Patches and Hotfixes Risk Level: Medium CVE: CVE-2016-2818
Description The scan detected that the host is missing the following update: ELSA-2016-1392
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://oss.oracle.com/pipermail/el-errata/2016-July/006176.html http://oss.oracle.com/pipermail/el-errata/2016-July/006177.html
OEL7 x86_64 thunderbird-45.2-1.0.1.el7_2
OEL6 x86_64 thunderbird-45.2-1.0.1.el6_8 i386 thunderbird-45.2-1.0.1.el6_8
174983 - Scientific Linux Security ERRATA Moderate: ocaml on SL7.x x86_64 (1607-75)
Category: SSH Module -> NonIntrusive -> Scientific Linux Patches and HotFixes Risk Level: Medium CVE: CVE-2015-8869
Description The scan detected that the host is missing the following update: Security ERRATA Moderate: ocaml on SL7.x x86_64 (1607-75)
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://listserv.fnal.gov/scripts/wa.exe?A2=ind1607&L=scientific-linux-errata&F=&S=&P=75
SL7 x86_64 graphviz-ocaml-2.30.1-19.el7 ocaml-libguestfs-devel-1.28.1-1.18.el7 graphviz-tcl-2.30.1-19.el7 tcl-brlapi-0.6.0-9.el7 graphviz-ruby-2.30.1-19.el7 ocaml-calendar-2.03.2-5.el7 ocaml-xml-light-2.3-0.6.svn234.el7 graphviz-perl-2.30.1-19.el7 graphviz-devel-2.30.1-19.el7 ocaml-hivex-devel-1.3.10-5.7.sl7 brlapi-devel-0.6.0-9.el7 graphviz-guile-2.30.1-19.el7 ruby-hivex-1.3.10-5.7.sl7 ocaml-curses-devel-1.0.3-18.el7 brltty-docs-4.5-9.el7 graphviz-lua-2.30.1-19.el7 brltty-4.5-9.el7 hivex-1.3.10-5.7.sl7 graphviz-java-2.30.1-19.el7 ocaml-camlp4-4.01.0-22.7.el7_2 ocaml-4.01.0-22.7.el7_2 graphviz-2.30.1-19.el7 ocaml-libvirt-0.6.1.2-10.el7 ocaml-source-4.01.0-22.7.el7_2 brlapi-java-0.6.0-9.el7 ocaml-docs-4.01.0-22.7.el7_2 graphviz-python-2.30.1-19.el7 ocaml-csv-1.2.3-6.el7 graphviz-graphs-2.30.1-19.el7 python-brlapi-0.6.0-9.el7 ocaml-findlib-devel-1.3.3-6.el7 ocaml-debuginfo-4.01.0-22.7.el7_2 ocaml-runtime-4.01.0-22.7.el7_2 python-hivex-1.3.10-5.7.sl7 ocaml-extlib-1.5.3-5.el7 ocaml-fileutils-devel-0.4.4-7.el7 ocaml-compiler-libs-4.01.0-22.7.el7_2 graphviz-php-2.30.1-19.el7 ocaml-x11-4.01.0-22.7.el7_2 graphviz-doc-2.30.1-19.el7 ocaml-xml-light-devel-2.3-0.6.svn234.el7 ocaml-labltk-4.01.0-22.7.el7_2 ocaml-extlib-devel-1.5.3-5.el7 brltty-at-spi-4.5-9.el7 ocaml-calendar-devel-2.03.2-5.el7 ocaml-hivex-1.3.10-5.7.sl7 ocaml-labltk-devel-4.01.0-22.7.el7_2 ocaml-gettext-0.3.4-13.el7 brltty-xw-4.5-9.el7 ocaml-emacs-4.01.0-22.7.el7_2 ocaml-camlp4-devel-4.01.0-22.7.el7_2 brlapi-0.6.0-9.el7 ocaml-csv-devel-1.2.3-6.el7 ocaml-libvirt-devel-0.6.1.2-10.el7 ocaml-fileutils-0.4.4-7.el7 perl-hivex-1.3.10-5.7.sl7 hivex-devel-1.3.10-5.7.sl7 ocaml-ocamldoc-4.01.0-22.7.el7_2 ocaml-gettext-devel-0.3.4-13.el7 ocaml-brlapi-0.6.0-9.el7 ocaml-findlib-1.3.3-6.el7 graphviz-gd-2.30.1-19.el7 ocaml-curses-1.0.3-18.el7 ocaml-labltk-devel-4.01.0-22.2.el7
174984 - Scientific Linux Security ERRATA Important: thunderbird on SL5.x, SL6.x, SL7.x i386/x86_64 (1607-390)
Category: SSH Module -> NonIntrusive -> Scientific Linux Patches and HotFixes Risk Level: Medium CVE: CVE-2016-2818
Description The scan detected that the host is missing the following update: Security ERRATA Important: thunderbird on SL5.x, SL6.x, SL7.x i386/x86_64 (1607-390)
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://listserv.fnal.gov/scripts/wa.exe?A2=ind1607&L=scientific-linux-errata&F=&S=&P=390
SL5 x86_64 thunderbird-45.2-1.el5_11 thunderbird-debuginfo-45.2-1.el5_11 i386 thunderbird-45.2-1.el5_11 thunderbird-debuginfo-45.2-1.el5_11
SL7 x86_64 thunderbird-45.2-1.el7_2 thunderbird-debuginfo-45.2-1.el7_2
SL6 x86_64 thunderbird-debuginfo-45.2-1.el6_8 thunderbird-45.2-1.el6_8 i386 thunderbird-debuginfo-45.2-1.el6_8 thunderbird-45.2-1.el6_8
182011 - FreeBSD quassel Remote Denial Of Service (7d64d00c-43e3-11e6-ab34-002590263bf5)
Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Medium CVE: CVE-2016-4414
Description The scan detected that the host is missing the following update: quassel -- remote denial of service (7d64d00c-43e3-11e6-ab34-002590263bf5)
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/7d64d00c-43e3-11e6-ab34-002590263bf5.html Affected packages: quassel < 0.12.4
130534 - Debian Linux 8.0 DSA-3617-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Debian Patches and Hotfixes Risk Level: Medium CVE: CVE-2015-3219, CVE-2016-4428
Description The scan detected that the host is missing the following update: DSA-3617-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.debian.org/security/2016/dsa-3617
Debian 8.0 all python-django-horizon_2014.1.3-7+deb8u2 openstack-dashboard-apache_2014.1.3-7+deb8u2 openstack-dashboard_2014.1.3-7+deb8u2
88789 - Slackware Linux 14.0, 14.1, 14.2 SSA:2016-189-01 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Slackware Patches and Hotfixes Risk Level: Low CVE: CVE-2016-2119
Description The scan detected that the host is missing the following update: SSA:2016-189-01
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.447238
Slackware 14.0 x86_64 samba-4.2.14-x86_64-1
Slackware 14.2 x86_64 samba-4.4.5-x86_64-1 i586 samba-4.4.5-i586-1
Slackware 14.1 x86_64 samba-4.2.14-x86_64-1 182009 - FreeBSD ruby-saml XML Signature Wrapping Attack (3fcd52b2-4510-11e6-a15f-00248c0c745d)
Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-2016-5697
Description The scan detected that the host is missing the following update: ruby-saml -- XML signature wrapping attack (3fcd52b2-4510-11e6-a15f-00248c0c745d)
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/3fcd52b2-4510-11e6-a15f-00248c0c745d.html
Affected packages: rubygem-ruby-saml < 1.3.0
182010 - FreeBSD samba Client Side SMB2/3 Required Signing Can Be Downgraded (4729c849-4897-11e6-b704- 000c292e4fd8)
Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-2016-2119
Description The scan detected that the host is missing the following update: samba -- client side SMB2/3 required signing can be downgraded (4729c849-4897-11e6-b704-000c292e4fd8)
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.vuxml.org/freebsd/4729c849-4897-11e6-b704-000c292e4fd8.html
Affected packages: 4.0.0 <= samba4 <= 4.0.26 4.1.0 <= samba41 <= 4.1.23 4.2.0 <= samba42 < 4.2.14 4.3.0 <= samba43 < 4.3.11 4.4.0 <= samba44 < 4.4.5
185348 - Ubuntu Linux 12.04, 14.04, 15.10, 16.04 USN-3028-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Ubuntu Patches and Hotfixes Risk Level: Low CVE: CVE-2016-1951
Description The scan detected that the host is missing the following update: USN-3028-1 Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-July/003495.html
Ubuntu 12.04 libnspr4_4.12-0ubuntu0.12.04.1
Ubuntu 16.04 libnspr4_4.12-0ubuntu0.16.04.1
Ubuntu 15.10 libnspr4_4.12-0ubuntu0.15.10.1
Ubuntu 14.04 libnspr4_4.12-0ubuntu0.14.04.1
185349 - Ubuntu Linux 16.04 USN-3027-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Ubuntu Patches and Hotfixes Risk Level: Low CVE: CVE-2016-3092
Description The scan detected that the host is missing the following update: USN-3027-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-July/003491.html
Ubuntu 16.04 tomcat8_8.0.32-1ubuntu1.1
185350 - Ubuntu Linux 12.04, 14.04, 15.10 USN-3031-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Ubuntu Patches and Hotfixes Risk Level: Low CVE: CVE-2016-2365, CVE-2016-2366, CVE-2016-2367, CVE-2016-2368, CVE-2016-2369, CVE-2016-2370, CVE-2016-2371, CVE- 2016-2372, CVE-2016-2373, CVE-2016-2374, CVE-2016-2375, CVE-2016-2376, CVE-2016-2377, CVE-2016-2378, CVE-2016-2380, CVE-2016-4323
Description The scan detected that the host is missing the following update: USN-3031-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-July/003497.html
Ubuntu 12.04 libpurple0_2.10.3-0ubuntu1.7
Ubuntu 15.10 libpurple0_2.10.11-0ubuntu4.2
Ubuntu 14.04 libpurple0_2.10.9-0ubuntu3.3
185352 - Ubuntu Linux 12.04, 14.04, 15.10, 16.04 USN-3030-1 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Ubuntu Patches and Hotfixes Risk Level: Low CVE: CVE-2013-7456, CVE-2016-5116, CVE-2016-5766, CVE-2016-6128, CVE-2016-6161
Description The scan detected that the host is missing the following update: USN-3030-1
Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-July/003494.html
Ubuntu 12.04 libgd2-noxpm_2.0.36~rc1~dfsg-6ubuntu2.2 libgd2-xpm_2.0.36~rc1~dfsg-6ubuntu2.2
Ubuntu 16.04 libgd3_2.1.1-4ubuntu0.16.04.2
Ubuntu 15.10 libgd3_2.1.1-4ubuntu0.15.10.2
Ubuntu 14.04 libgd3_2.1.0-3ubuntu0.2
ENHANCED CHECKS
The following checks have been updated. Enhancements may include optimizations, changes that reflect new information on a vulnerability and anything else that improves upon an existing FSL check. 16914 - Oracle WebLogic Server Critical Patch Update July 2014
Category: Windows Host Assessment -> Miscellaneous (CATEGORY REQUIRES CREDENTIALS) Risk Level: High CVE: CVE-2013-5855, CVE-2014-2479, CVE-2014-2480, CVE-2014-2481, CVE-2014-4201, CVE-2014-4202, CVE-2014-4210, CVE- 2014-4217, CVE-2014-4241, CVE-2014-4242, CVE-2014-4253, CVE-2014-4254, CVE-2014-4255, CVE-2014-4256, CVE-2014-4267
Update Details FASLScript is updated
17289 - Oracle WebLogic Server Critical Patch Update October 2014
Category: Windows Host Assessment -> Miscellaneous (CATEGORY REQUIRES CREDENTIALS) Risk Level: High CVE: CVE-2014-0114, CVE-2014-6534
Update Details FASLScript is updated
15023 - HP Multiple LaserJet Printers Information Disclosure Vulnerability
Category: General Vulnerability Assessment -> NonIntrusive -> Printers and Print Servers Risk Level: Medium CVE: CVE-2012-5221
Update Details FASLScript is updated
16140 - (HPSBPI02938) HP LaserJet Printers Denial of Service Vulnerability
Category: General Vulnerability Assessment -> NonIntrusive -> Printers and Print Servers Risk Level: Medium CVE: CVE-2013-6193
Update Details FASLScript is updated
17661 - Oracle WebLogic Server Critical Patch Update January 2015
Category: Windows Host Assessment -> Miscellaneous (CATEGORY REQUIRES CREDENTIALS) Risk Level: Medium CVE: CVE-2013-2186, CVE-2014-6569
Update Details FASLScript is updated
18207 - Oracle WebLogic Server Critical Patch Update April 2015
Category: Windows Host Assessment -> Miscellaneous (CATEGORY REQUIRES CREDENTIALS) Risk Level: Medium CVE: CVE-2015-0449, CVE-2015-0482
Update Details FASLScript is updated
18686 - Oracle WebLogic Server Critical Patch Update July 2015
Category: Windows Host Assessment -> Miscellaneous (CATEGORY REQUIRES CREDENTIALS) Risk Level: Medium CVE: CVE-2015-2623, CVE-2015-4744
Update Details FASLScript is updated
15116 - (SOL13400) F5 BIG-IP SSL/TLS BEAST Vulnerability
Category: SSH Module -> NonIntrusive -> F5 Risk Level: Medium CVE: CVE-2011-3389, CVE-2012-1870
Update Details Description is updated Observation is updated Documentation is updated
181743 - FreeBSD qemu Denial Of Service Vulnerability In Q35 Chipset Emulation (152acff3-b1bd-11e5-9728- 002590263bf5)
Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-2015-8666
Update Details FASLScript is updated
181829 - FreeBSD qemu Denial Of Service Vulnerability In Human Monitor Interface Support (62ab8707-b1bc-11e5-9728- 002590263bf5)
Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-2015-8619
Update Details FASLScript is updated
181835 - FreeBSD qemu Denial Of Service Vulnerability In MegaRAID SAS HBA Emulation (b3f9f8ef-b1bb-11e5-9728- 002590263bf5)
Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-2015-8613
Update Details FASLScript is updated
181838 - FreeBSD qemu Denial Of Service Vulnerability In VMWARE VMXNET3 NIC Support (9ad8993e-b1ba-11e5-9728- 002590263bf5)
Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-2015-8567, CVE-2015-8568
Update Details FASLScript is updated
181839 - FreeBSD qemu Denial Of Service Vulnerabilities In Eepro100 NIC Support (b56fe6bb-b1b1-11e5-9728- 002590263bf5)
Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-2015-8345
Update Details FASLScript is updated
181840 - FreeBSD qemu Denial Of Service Vulnerability In Rocker Switch Emulation (1384f2fd-b1be-11e5-9728- 002590263bf5)
Category: SSH Module -> NonIntrusive -> FreeBSD Patches and Hotfixes Risk Level: Low CVE: CVE-2015-8701
Update Details FASLScript is updated
14347 - Microsoft .NET Framework Obsolete Version Detection
Category: Windows Host Assessment -> EOL and Obsolete Software (CATEGORY REQUIRES CREDENTIALS) Risk Level: Informational CVE: CVE-MAP-NOMATCH
Update Details FASLScript is updated
51049 - Oracle Solaris Locked User Account
Category: SSH Module -> NonIntrusive -> Solaris Security Policy/Options Risk Level: Informational CVE: CVE-MAP-NOMATCH
Update Details FASLScript is updated 70078 - hp-laserjet.fasl3.inc
Category: General Vulnerability Assessment -> NonIntrusive -> Invalid Category Risk Level: Informational CVE: CVE-MAP-NOMATCH
Update Details FASLScript is updated
HOW TO UPDATE
FS1000 APPLIANCE customers should follow the instructions for Enterprise/Professional customers, below. In addition, we strongly urge all appliance customers to authorize and install any Windows Update critical patches. The appliance will auto-download any critical updates but will wait for your explicit authorization before installing.
FOUNDSTONE ENTERPRISE and PROFESSIONAL customers may obtain these new scripts using the FSUpdate Utility by selecting "FoundScan Update" on the help menu. Make sure that you have a valid FSUpdate username and password. The new vulnerability scripts will be automatically included in your scans if you have selected that option by right-clicking the selected vulnerability category and checking the "Run New Checks" checkbox.
MANAGED SERVICE CUSTOMERS already have the newest update applied to their environment. The new vulnerability scripts will be automatically included when your scans are next scheduled, provided the Run New Scripts option has been turned on.
MCAFEE TECHNICAL SUPPORT
ServicePortal: https://mysupport.mcafee.com/ Multi-National Phone Support available here: http://www.mcafee.com/us/about/contact/index.html Non-US customers - Select your country from the list of Worldwide Offices.
This email may contain confidential and privileged material for the sole use of the intended recipient. Any review or distribution by others is strictly prohibited. If you are not the intended recipient please contact the sender and delete all copies.
Copyright 2016 McAfee, Inc. McAfee is a registered trademark of McAfee, Inc. and/or its affiliates