Mcafee Foundstone Fsl Update

Mcafee Foundstone Fsl Update

2020-SEP-16 FSL version 7.6.173 MCAFEE FOUNDSTONE FSL UPDATE To better protect your environment McAfee has created this FSL check update for the Foundstone Product Suite. The following is a detailed summary of the new and updated checks included with this release. NEW CHECKS 149363 - SuSE Linux 15.2 openSUSE-SU-2020:1369-1 Update Is Not Installed Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2020-15049, CVE-2020-15810, CVE-2020-15811, CVE-2020-24606 Description The scan detected that the host is missing the following update: openSUSE-SU-2020:1369-1 Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.opensuse.org/opensuse-updates/2020-09/msg00060.html SuSE Linux 15.2 x86_64 squid-debugsource-4.13-lp152.2.6.1 squid-debuginfo-4.13-lp152.2.6.1 squid-4.13-lp152.2.6.1 149365 - SuSE Linux 15.1 openSUSE-SU-2020:1346-1 Update Is Not Installed Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2020-15049, CVE-2020-15810, CVE-2020-15811, CVE-2020-24606 Description The scan detected that the host is missing the following update: openSUSE-SU-2020:1346-1 Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.opensuse.org/opensuse-updates/2020-09/msg00033.html SuSE Linux 15.1 x86_64 squid-debugsource-4.13-lp151.2.24.1 squid-4.13-lp151.2.24.1 squid-debuginfo-4.13-lp151.2.24.1 149393 - SuSE SLES 12 SP5 SUSE-SU-2020:2443-1 Update Is Not Installed Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2020-15049, CVE-2020-15810, CVE-2020-15811, CVE-2020-24606 Description The scan detected that the host is missing the following update: SUSE-SU-2020:2443-1 Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.suse.com/pipermail/sle-security-updates/2020-September/007332.html SuSE SLES 12 SP5 x86_64 squid-debugsource-4.13-4.15.1 squid-4.13-4.15.1 squid-debuginfo-4.13-4.15.1 27036 - (MSPT-Sep2020) Microsoft Windows GDI Remote Code Execution (CVE-2020-1285) Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS) Risk Level: High CVE: CVE-2020-1285 Description A vulnerability in some versions of Microsoft Windows could lead to remote code execution. Observation A vulnerability in some versions of Microsoft Windows could lead to remote code execution. The flaw lies in the GDI component. Successful exploitation by a remote attacker could result in the execution of arbitrary code. The exploit requires the user to open a vulnerable website, email or document. 27045 - (MSPT-Sep2020) Microsoft Windows WDAC Remote Code Execution (CVE-2020-0951) Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS) Risk Level: High CVE: CVE-2020-0951 Description A vulnerability in some versions of Microsoft Windows could lead to remote code execution. Observation A vulnerability in some versions of Microsoft Windows could lead to remote code execution. The flaw lies in the WDAC component. Successful exploitation by a remote attacker could result in the execution of arbitrary code. The exploit requires the attacker to have valid credentials to the vulnerable system. 27046 - (MSPT-Sep2020) Microsoft Hyper-V Improperly Validate Malicious Data Denial of Service (CVE-2020-0890) Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS) Risk Level: High CVE: CVE-2020-0890 Description A vulnerability in some versions of Microsoft Hyper-V could lead to a denial of service. Observation A vulnerability in some versions of Microsoft Hyper-V could lead to a denial of service. The flaw lies in improperly validate malicious data. Successful exploitation by a remote attacker could result in a denial of service condition. The exploit requires the attacker to have valid credentials to the vulnerable system. 27047 - (MSPT-Sep2020) Microsoft Hyper-V Improperly Validate Malicious Data Denial of Service (CVE-2020-0904) Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS) Risk Level: High CVE: CVE-2020-0904 Description A vulnerability in some versions of Microsoft Hyper-V could lead to a denial of service. Observation A vulnerability in some versions of Microsoft Hyper-V could lead to a denial of service. The flaw lies in improperly validate malicious data. Successful exploitation by a remote attacker could result in a denial of service condition. The exploit requires the attacker to have valid credentials to the vulnerable system. 27053 - (MSPT-Sep2020) Microsoft Windows Improperly Handles Objects in Memory Remote Code Execution (CVE-2020- 1252) Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS) Risk Level: High CVE: CVE-2020-1252 Description A vulnerability in some versions of Microsoft Windows could lead to remote code execution. Observation A vulnerability in some versions of Microsoft Windows could lead to remote code execution. The flaw lies in the improperly handles objects in memory. Successful exploitation by a remote attacker could result in the execution of arbitrary code. The exploit requires the attacker to have valid credentials to the vulnerable system. 27055 - (MSPT-Sep2020) Microsoft Windows Codecs Library Remote Code Execution (CVE-2020-1129) Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS) Risk Level: High CVE: CVE-2020-1129 Description A vulnerability in some versions of Microsoft Windows could lead to remote code execution. Observation A vulnerability in some versions of Microsoft Windows could lead to remote code execution. The flaw lies in the Codecs Library component. Successful exploitation by a remote attacker could result in the execution of arbitrary code. 27057 - (MSPT-Sep2020) Microsoft Windows Camera Codec Pack Remote Code Execution (CVE-2020-0997) Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS) Risk Level: High CVE: CVE-2020-0997 Description A vulnerability in some versions of Microsoft Windows could lead to remote code execution. Observation A vulnerability in some versions of Microsoft Windows could lead to remote code execution. The flaw lies in the Camera Codec Pack component. Successful exploitation by a remote attacker could result in the execution of arbitrary code. The exploit requires the user to open a vulnerable website, email or document. 27060 - (MSPT-Sep2020) Microsoft Windows Projected Filesystem Remote Code Execution (CVE-2020-0805) Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS) Risk Level: High CVE: CVE-2020-0805 Description A vulnerability in some versions of Microsoft Windows could lead to remote code execution. Observation A vulnerability in some versions of Microsoft Windows could lead to remote code execution. The flaw lies in the Projected Filesystem component. Successful exploitation by a remote attacker could result in the execution of arbitrary code. The exploit requires the attacker to have valid credentials to the vulnerable system. 27061 - (MSPT-Sep2020) Microsoft Windows DNS Denial of Service (CVE-2020-0836) Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS) Risk Level: High CVE: CVE-2020-0836 Description A vulnerability in some versions of Microsoft Windows could lead to a denial of service. Observation A vulnerability in some versions of Microsoft Windows could lead to a denial of service. The flaw lies in the DNS component. Successful exploitation by a remote attacker could result in a denial of service condition. The exploit requires the attacker to have valid credentials to the vulnerable system. 27067 - (MSPT-Sep2020) Microsoft Windows Text Service Module Remote Code Execution (CVE-2020-0908) Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS) Risk Level: High CVE: CVE-2020-0908 Description A vulnerability in some versions of Microsoft Windows could lead to remote code execution. Observation A vulnerability in some versions of Microsoft Windows could lead to remote code execution. The flaw lies in the Text Service Module component. Successful exploitation by a remote attacker could result in the execution of arbitrary code. The exploit requires the attacker to have valid credentials to the vulnerable system. 27070 - (MSPT-Sep2020) Microsoft Windows Routing Utilities Denial of Service (CVE-2020-1038) Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS) Risk Level: High CVE: CVE-2020-1038 Description A vulnerability in some versions of Microsoft Windows could lead to a denial of service. Observation A vulnerability in some versions of Microsoft Windows could lead to a denial of service. The flaw lies in the Routing Utilities component. Successful exploitation by a remote attacker could result in a denial of service condition. The exploit requires the attacker to have valid credentials to the vulnerable system. 27073 - (MSPT-Sep2020) Microsoft Windows DNS Denial of Service (CVE-2020-1228) Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS) Risk Level: High CVE: CVE-2020-1228 Description A vulnerability in some versions of Microsoft Windows could lead to a denial of service. Observation A vulnerability in some versions

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    90 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us