Mcafee Foundstone Fsl Update

Mcafee Foundstone Fsl Update

2018-OCT-18 FSL version 7.6.61 MCAFEE FOUNDSTONE FSL UPDATE To better protect your environment McAfee has created this FSL check update for the Foundstone Product Suite. The following is a detailed summary of the new and updated checks included with this release. NEW CHECKS 24301 - Mozilla Firefox ESR Vulnerabilities Prior To ESR 60.2.2 Category: Windows Host Assessment -> Miscellaneous (CATEGORY REQUIRES CREDENTIALS) Risk Level: High CVE: CVE-2018-12386, CVE-2018-12387 Description Multiple Vulnerabilities are present in some versions of Mozilla Firefox ESR. Observation Mozilla Firefox ESR is a popular web browser. Multiple Vulnerabilities are present in some versions of Mozilla Firefox ESR. The flaws lie in multiple components. Successful exploitation could allow an attacker to execute arbitrary codes in the system. 24302 - Mozilla Firefox ESR Vulnerabilities Prior To ESR 60.2.2 Category: SSH Module -> NonIntrusive -> SSH Miscellaneous Risk Level: High CVE: CVE-2018-12386, CVE-2018-12387 Description Multiple Vulnerabilities are present in some versions of Mozilla Firefox ESR. Observation Mozilla Firefox ESR is a popular web browser. Multiple Vulnerabilities are present in some versions of Mozilla Firefox ESR. The flaws lie in multiple components. Successful exploitation could allow an attacker to execute arbitrary codes in the system. 139097 - Oracle Solaris 11.3.35.6.0 Update Is Not Installed (Third Party Components) Category: SSH Module -> NonIntrusive -> Solaris Patches and Hotfixes Risk Level: High CVE: CVE-2017-3463, CVE-2017-3464, CVE-2017-3465, CVE-2017-3467, CVE-2017-3468, CVE-2017-3529, CVE-2017-3599, CVE-2017-3600, CVE-2017-3633, CVE-2017-3634, CVE-2017-3635, CVE-2017-3637, CVE-2017-3638, CVE-2017-3639, CVE- 2017-3640, CVE-2017-3642, CVE-2017-3643, CVE-2017-3644, CVE-2017-3645, CVE-2017-3647, CVE-2017-3648, CVE-2017- 3649, CVE-2017-3651, CVE-2017-3652, CVE-2017-3653, CVE-2017-3731, CVE-2017-3732, CVE-2017-3737, CVE-2017-3738, CVE-2017-5838, CVE-2017-5839, CVE-2017-5840, CVE-2017-5841, CVE-2017-5842, CVE-2017-5844, CVE-2017-5845, CVE- 2017-7544, CVE-2018-0495, CVE-2018-0739, CVE-2018-10392, CVE-2018-10393, CVE-2018-10963, CVE-2018-12359, CVE- 2018-12360, CVE-2018-12362, CVE-2018-12363, CVE-2018-12364, CVE-2018-12365, CVE-2018-12366, CVE-2018-12368, CVE- 2018-12372, CVE-2018-12373, CVE-2018-12374, CVE-2018-1336, CVE-2018-14339, CVE-2018-14340, CVE-2018-14341, CVE- 2018-14342, CVE-2018-14343, CVE-2018-14344, CVE-2018-14367, CVE-2018-14368, CVE-2018-14369, CVE-2018-2562, CVE- 2018-2565, CVE-2018-2573, CVE-2018-2576, CVE-2018-2583, CVE-2018-2586, CVE-2018-2590, CVE-2018-2591, CVE-2018- 2600, CVE-2018-2612, CVE-2018-2622, CVE-2018-2640, CVE-2018-2645, CVE-2018-2646, CVE-2018-2647, CVE-2018-2665, CVE-2018-2667, CVE-2018-2668, CVE-2018-2696, CVE-2018-2703, CVE-2018-2755, CVE-2018-2758, CVE-2018-2759, CVE- 2018-2761, CVE-2018-2762, CVE-2018-2766, CVE-2018-2767, CVE-2018-2769, CVE-2018-2771, CVE-2018-2773, CVE-2018- 2775, CVE-2018-2776, CVE-2018-2777, CVE-2018-2778, CVE-2018-2779, CVE-2018-2780, CVE-2018-2781, CVE-2018-2782, CVE-2018-2784, CVE-2018-2786, CVE-2018-2787, CVE-2018-2810, CVE-2018-2812, CVE-2018-2813, CVE-2018-2816, CVE- 2018-2817, CVE-2018-2818, CVE-2018-2819, CVE-2018-2839, CVE-2018-2846, CVE-2018-2922, CVE-2018-3054, CVE-2018- 3056, CVE-2018-3058, CVE-2018-3060, CVE-2018-3061, CVE-2018-3062, CVE-2018-3064, CVE-2018-3065, CVE-2018-3066, CVE-2018-3070, CVE-2018-3077, CVE-2018-3081, CVE-2018-5146 Description The scan detected that the host is missing the following update: SRU 11.3.35.6.0 Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://support.oracle.com/rs?type=doc&id=2437228.1 https://support.oracle.com/epmos/faces/DocumentDisplay? _afrLoop=507462766511768&id=1448883.1&_afrWindowMode=0&_adf.ctrl-state=98kg3qcn0_33#aref_section26 139100 - Oracle Solaris 11.4 Update Is Not Installed (Third Party Components) Category: SSH Module -> NonIntrusive -> Solaris Patches and Hotfixes Risk Level: High CVE: CVE-2016-6352, CVE-2016-7044, CVE-2016-7045, CVE-2016-7162, CVE-2016-7163, CVE-2016-7166, CVE-2016-7445, CVE-2016-7553, CVE-2016-7957, CVE-2016-7958, CVE-2016-7976, CVE-2016-7977, CVE-2016-7978, CVE-2016-7979, CVE- 2016-8864, CVE-2016-9013, CVE-2016-9014, CVE-2016-9179, CVE-2016-9185, CVE-2017-10788, CVE-2017-11109, CVE-2017- 11112, CVE-2017-11113, CVE-2017-12176, CVE-2017-12177, CVE-2017-12178, CVE-2017-12179, CVE-2017-12180, CVE-2017- 12181, CVE-2017-12182, CVE-2017-12183, CVE-2017-12184, CVE-2017-12185, CVE-2017-12186, CVE-2017-12187, CVE-2017- 12982, CVE-2017-14039, CVE-2017-14040, CVE-2017-14041, CVE-2017-14151, CVE-2017-14152, CVE-2017-14164, CVE-2017- 2292, CVE-2017-2592, CVE-2017-3135, CVE-2017-3136, CVE-2017-3137, CVE-2017-3138, CVE-2017-3140, CVE-2017-5334, CVE-2017-5335, CVE-2017-5336, CVE-2017-5337, CVE-2017-5429, CVE-2017-5430, CVE-2017-5432, CVE-2017-5433, CVE- 2017-5434, CVE-2017-5435, CVE-2017-5436, CVE-2017-5438, CVE-2017-5439, CVE-2017-5440, CVE-2017-5441, CVE-2017- 5442, CVE-2017-5443, CVE-2017-5444, CVE-2017-5445, CVE-2017-5446, CVE-2017-5447, CVE-2017-5448, CVE-2017-5449, CVE-2017-5451, CVE-2017-5454, CVE-2017-5455, CVE-2017-5456, CVE-2017-5459, CVE-2017-5460, CVE-2017-5461, CVE- 2017-5462, CVE-2017-5464, CVE-2017-5465, CVE-2017-5466, CVE-2017-5467, CVE-2017-5468, CVE-2017-5469, CVE-2017- 5715, CVE-2017-5754, CVE-2017-7407, CVE-2017-7511, CVE-2017-7555, CVE-2017-8291, CVE-2017-8786, CVE-2017-8932, CVE-2017-9083, CVE-2017-9110, CVE-2017-9111, CVE-2017-9112, CVE-2017-9113, CVE-2017-9114, CVE-2017-9115, CVE- 2017-9116, CVE-2017-9406, CVE-2017-9408, CVE-2018-1166, CVE-2018-3263, CVE-2018-3264, CVE-2018-3265, CVE-2018- 3266, CVE-2018-3267, CVE-2018-3268, CVE-2018-3269, CVE-2018-3270, CVE-2018-3271, CVE-2018-3272, CVE-2018-3273, CVE-2018-3274, CVE-2018-3275, CVE-2018-3665 Description The scan detected that the host is missing the following update: SRU 11.4 Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://support.oracle.com/rs?type=doc&id=2433412.1 https://support.oracle.com/epmos/faces/DocumentDisplay? _afrLoop=507462766511768&id=1448883.1&_afrWindowMode=0&_adf.ctrl-state=98kg3qcn0_33#aref_section26 194308 - Fedora Linux 27 FEDORA-2018-1fc39f2d13 Update Is Not Installed Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: High CVE: CVE-2012-6706, CVE-2017-11423, CVE-2017-12374, CVE-2017-12375, CVE-2017-12376, CVE-2017-12377, CVE-2017- 12378, CVE-2017-12379, CVE-2017-12380, CVE-2017-6418, CVE-2017-6419, CVE-2017-6420, CVE-2018-0202, CVE-2018- 1000085, CVE-2018-14679, CVE-2018-14680, CVE-2018-14681, CVE-2018-14682, CVE-2018-15378 Description The scan detected that the host is missing the following update: FEDORA-2018-1fc39f2d13 Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2018/10/?count=200&page=1 Fedora Core 27 clamav-0.100.2-2.fc27 194309 - Fedora Linux 27 FEDORA-2018-94315e9a6b Update Is Not Installed Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: High CVE: CVE-2017-1000405, CVE-2017-12193, CVE-2017-15115, CVE-2017-16532, CVE-2017-16538, CVE-2017-16644, CVE- 2017-16647, CVE-2017-16649, CVE-2017-16650, CVE-2017-17448, CVE-2017-17449, CVE-2017-17450, CVE-2017-17558, CVE- 2017-17712, CVE-2017-17741, CVE-2017-17852, CVE-2017-17853, CVE-2017-17854, CVE-2017-17855, CVE-2017-17856, CVE- 2017-17857, CVE-2017-17862, CVE-2017-17863, CVE-2017-17864, CVE-2017-18232, CVE-2017-8824, CVE-2018-1000004, CVE-2018-1000026, CVE-2018-10021, CVE-2018-10322, CVE-2018-10323, CVE-2018-1065, CVE-2018-10840, CVE-2018- 10853, CVE-2018-1108, CVE-2018-1120, CVE-2018-11506, CVE-2018-12232, CVE-2018-12633, CVE-2018-12714, CVE-2018- 12896, CVE-2018-13053, CVE-2018-13093, CVE-2018-13094, CVE-2018-13095, CVE-2018-13405, CVE-2018-14633, CVE-2018- 14678, CVE-2018-14734, CVE-2018-15471, CVE-2018-17182, CVE-2018-18021, CVE-2018-3620, CVE-2018-3639, CVE-2018- 3646, CVE-2018-5332, CVE-2018-5333, CVE-2018-5344, CVE-2018-5391, CVE-2018-5750, CVE-2018-5803, CVE-2018-7757, CVE-2018-7995, CVE-2018-8043 Description The scan detected that the host is missing the following update: FEDORA-2018-94315e9a6b Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.fedoraproject.org/archives/list/[email protected]/2018/10/?count=200&page=2 Fedora Core 27 kernel-4.18.12-100.fc27 kernel-headers-4.18.12-100.fc27 194313 - Fedora Linux 28 FEDORA-2018-9f4381d8c4 Update Is Not Installed Category: SSH Module -> NonIntrusive -> Fedora Patches and Hotfixes Risk Level: High CVE: CVE-2018-10322, CVE-2018-10323, CVE-2018-10840, CVE-2018-10853, CVE-2018-1108, CVE-2018-1120, CVE-2018- 11506, CVE-2018-12232, CVE-2018-12633, CVE-2018-12714, CVE-2018-12896, CVE-2018-13053, CVE-2018-13093, CVE-2018- 13094, CVE-2018-13095, CVE-2018-13405, CVE-2018-14633, CVE-2018-14678, CVE-2018-14734, CVE-2018-15471, CVE-2018- 17182, CVE-2018-17972, CVE-2018-3620, CVE-2018-3639, CVE-2018-3646, CVE-2018-5391 Description The scan detected that the host is missing the following update: FEDORA-2018-9f4381d8c4 Observation Updates often remediate critical security problems that should be quickly addressed.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    86 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us