Summary
The latest update to the TrustKeeper scan engine that powers our Trustwave Vulnerability Management product (including both internal and external vulnerability scanning) is now available. Enjoy!
New Vulnerability Test Highlights
Some of the more interesting vulnerability tests we added recently are as follows:
Cisco
- Inspection of a stream of malformed TCP packets vulnerability in Cisco ASA 5500-X Series (CVE-2007-0959)
- Inspection of malformed Session Initiation Protocol (SIP) packets for Cisco ASA 5500-X Series (CVE-2007-0959)
ISC BIND
- Bind vulnerable to DoS via a race condition when handling socket errors (CVE-2015-8461)
- Bind vulnerable to DoS via responses with a malformed class attribute (CVE-2015-8000)
Drupal
- Drupal Arbitrary Code Execution via Installer Vulnerability (DRUPAL-SA-2007-025) (CVE-2007-5593)
- Drupal Cross-site Request Forgeries Vulnerabilities (DRUPAL-SA-2006-025) (CVE-2006-5476, CVE-2006-5477)
- Drupal Cross-site Scripting via uploads Vulnerability (DRUPAL-SA-2007-026) (CVE-2007-5596)
- Drupal Cross-site Scripting Vulnerabilities (DRUPAL-SA-2006-002) (CVE-2006-1226)
- Drupal Cross-site Scripting Vulnerability (DRUPAL-SA-2007-001) (CVE-2007-0136)
- Drupal Cross-site Scripting Vulnerability (DRUPAL-SA-2008-007) (CVE-2008-0274)
- Drupal Cross-site Scripting Vulnerability (DRUPAL-SA-2008-018) (CVE-2008-1131)
- Drupal Cross-site Scripting Vulnerability (DRUPAL-SA-CORE-2009-005) (CVE-2009-1575, CVE-2009-1576)
- Drupal Cross-site Scripting Vulnerability (DRUPAL-SA-CORE-2009-006) (CVE-2009-1844)
- Drupal Denial of Service Vulnerability (DRUPAL-SA-2007-002) (CVE-2007-0124)
- Drupal Denial of Service Vulnerability (DRUPAL-SA-CORE-2013-002) (CVE-2013-0316)
- Drupal Denial of Service Vulnerability (DRUPAL-SA-CORE-2014-004) (CVE-2014-5265, CVE-2014-5266, CVE-2014-5267)
- Drupal HTTP Response Splitting Vulnerability (DRUPAL-SA-2007-024) (CVE-2007-5595)
- Drupal Information Disclosure Vulnerability (DRUPAL-SA-CORE-2014-002) (CVE-2014-2983)
- Drupal Multiple Cross-site Request Forgeries Vulnerabilities (DRUPAL-SA-2007-017) (CVE-2007-4063)
- Drupal Multiple Cross-site Scripting Vulnerabilities (DRUPAL-SA-2006-024) (CVE-2006-5475)
- Drupal Multiple Cross-site Scripting Vulnerabilities (DRUPAL-SA-2007-018) (CVE-2007-4064)
- Drupal Multiple Vulnerabilities (DRUPAL-SA-2008-044) (CVE-2008-3219, CVE-2008-3220)
- Drupal Multiple Vulnerabilities (DRUPAL-SA-2008-047) (CVE-2008-3741, CVE-2008-3743, CVE-2008-3744)
- Drupal Multiple Vulnerabilities (DRUPAL-SA-2008-060) (CVE-2008-4789, CVE-2008-4790)
- Drupal Multiple Vulnerabilities (DRUPAL-SA-CORE-2009-007) (CVE-2009-2372, CVE-2009-2374)
- Drupal Multiple Vulnerabilities (DRUPAL-SA-CORE-2010-002) (CVE-2010-3093, CVE-2010-3094)
- Drupal Multiple vulnerabilities (DRUPAL-SA-CORE-2014-003) (CVE-2014-5019, CVE-2014-5020, CVE-2014-5021, CVE-2014-5022)
- Drupal Multiple Vulnerabilities (DRUPAL-SA-CORE-2015-001) (CVE-2015-2559, CVE-2015-2749, CVE-2015-2750)
- Drupal Multiple Vulnerabilities (DRUPAL-SA-CORE-2015-002) (CVE-2015-3231, CVE-2015-3232, CVE-2015-3233, CVE-2015-3234)
- Drupal Multiple Vulnerabilities (DRUPAL-SA-CORE-2015-003) (CVE-2015-6658, CVE-2015-6659, CVE-2015-6660, CVE-2015-6661, CVE-2015-6665)
- Drupal Session Fixation Vulnerability (DRUPAL-SA-2006-003) (CVE-2006-1228)
- Drupal SQL Injection Vulnerability (DRUPAL-SA-2006-005) (CVE-2006-2742)
- Drupal User Deletion Cross-site Request Forgery Vulnerability (DRUPAL-SA-2007-029) (CVE-2007-5594)
FreeBSD
- FreeBSD SSL/TLS Renegotiation Handshakes Vulnerability (CVE-2009-3555)
- FreeBSD OpenSSH X11-Forwarding Privilege Escalation Vulnerability (CVE-2008-1483)
- FreeBSD gtar Directory Traversal Vulnerability (CVE-2007-4131)
- FreeBSD Tcpdump Remote Code Execution (CVE-2007-3798)
Joomla
- Joomla! Remote Code Execution via Object Injection (CVE-2015-8562)
PHP
- PHP Denial of Service Vulnerability via Link Indicator Reference (CVE-2015-7803)
- PHP Denial of Service Vulnerability via PHAR Archives (CVE-2015-7804)
- PHP Local Privilege Escalation Vulnerability via FPM (CVE-2014-0185)
Other
How to Update?
All Trustwave customers using the TrustKeeper Scan Engine receive the updates automatically as soon as an update is available. No action is required.