2019-SEP-11 FSL version 7.6.128 MCAFEE FOUNDSTONE FSL UPDATE To better protect your environment McAfee has created this FSL check update for the Foundstone Product Suite. The following is a detailed summary of the new and updated checks included with this release. NEW CHECKS 131424 - Debian Linux 10.0, 9.0 DSA-4517-1 Update Is Not Installed Category: SSH Module -> NonIntrusive -> Debian Patches and Hotfixes Risk Level: High CVE: CVE-2019-15846 Description The scan detected that the host is missing the following update: DSA-4517-1 Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://www.debian.org/security/2019/dsa-4517 Debian 9.0 all exim4_4.89-2+deb9u6 Debian 10.0 all exim4_4.92-8+deb10u2 148299 - SuSE Linux 15.0, 15.1 openSUSE-SU-2019:2093-1 Update Is Not Installed Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2019-15846 Description The scan detected that the host is missing the following update: openSUSE-SU-2019:2093-1 Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://lists.opensuse.org/opensuse-updates/2019-09/msg00051.html SuSE Linux 15.0 x86_64 exim-4.88-lp150.3.9.1 eximstats-html-4.88-lp150.3.9.1
73
Embed
MCAFEE FOUNDSTONE FSL UPDATE 2019-SEP-11...Code Execution (CVE-201 Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS) Risk Level: High CVE: CVE-2019-1306
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
2019-SEP-11FSL version 7.6.128
MCAFEE FOUNDSTONE FSL UPDATE
To better protect your environment McAfee has created this FSL check update for the Foundstone Product Suite. The following is adetailed summary of the new and updated checks included with this release.
NEW CHECKS
131424 - Debian Linux 10.0, 9.0 DSA-4517-1 Update Is Not Installed
SuSE Linux 15.1x86_64exim-4.88-lp151.4.9.1eximstats-html-4.88-lp151.4.9.1eximon-debuginfo-4.88-lp151.4.9.1eximon-4.88-lp151.4.9.1exim-debugsource-4.88-lp151.4.9.1exim-debuginfo-4.88-lp151.4.9.1
171139 - Amazon Linux AMI ALAS-2019-1277 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Amazon Linux Patches and HotfixesRisk Level: HighCVE: CVE-2019-15846
DescriptionThe scan detected that the host is missing the following update:ALAS-2019-1277
ObservationUpdates often remediate critical security problems that should be quickly addressed.For more information see:
https://alas.aws.amazon.com/ALAS-2019-1277.html
Amazon Linux AMIx86_64exim-greylist-4.92-1.24.amzn1exim-pgsql-4.92-1.24.amzn1exim-mysql-4.92-1.24.amzn1exim-mon-4.92-1.24.amzn1exim-debuginfo-4.92-1.24.amzn1exim-4.92-1.24.amzn1
25653 - (APSB19-46) Vulnerability In Adobe Flash Player
Category: Windows Host Assessment -> Adobe Patches Only (CATEGORY REQUIRES CREDENTIALS)Risk Level: HighCVE: CVE-2019-8069, CVE-2019-8070
DescriptionMultiple vulnerabilities in some versions of Adobe Flash Player could lead to remote code execution.
ObservationMultiple vulnerabilities in some versions of Adobe Flash Player could lead to remote code execution.
The flaws lie in several components. Successful exploitation by a remote attacker could result in the execution of arbitrary code. The exploit requires the user to open a vulnerable website, email or document.
163992 - Oracle Enterprise Linux ELSA-2019-2694 Update Is Not Installed
25582 - (MSPT-Sep2019) Microsoft Explorer VBScript Remote Code Execution (CVE-2019-1208)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: HighCVE: CVE-2019-1208
DescriptionA vulnerability in some versions of Microsoft Explorer could lead to remote code execution.
ObservationA vulnerability in some versions of Microsoft Explorer could lead to remote code execution.
The flaw lies in the VBScript component. Successful exploitation by a remote attacker could result in the execution of arbitrary code. The exploit requires the user to open a vulnerable website, email or document.
25583 - (MSPT-Sep2019) Microsoft VBScript Improperly Handles Objects in Memory Remote Code Execution (CVE-2019-1236)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: HighCVE: CVE-2019-1236
DescriptionA vulnerability in some versions of Microsoft VBScript could lead to remote code execution.
ObservationA vulnerability in some versions of Microsoft VBScript could lead to remote code execution.
The flaw lies in the Improperly Handles Objects in Memory component. Successful exploitation by a remote attacker could result in the execution of arbitrary code. The exploit requires the user to open a vulnerable website, email or document.
25591 - (MSPT-Sep2019) Microsoft Exchange Improperly Handles Objects in Memory Denial of Service (CVE-2019-1233)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: HighCVE: CVE-2019-1233
DescriptionA vulnerability in some versions of Microsoft Exchange could lead to a denial of service.
ObservationA vulnerability in some versions of Microsoft Exchange could lead to a denial of service.
The flaw lies due to Improperly Handles Objects in Memory. Successful exploitation by a remote attacker could result in a denial of service condition. The exploit requires the user to open a vulnerable website, email or document.
25594 - (MSPT-Sep2019) Microsoft Team Foundation Server Improperly Sanitize Input Remote Code Execution (CVE-2019-1305)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: HighCVE: CVE-2019-1305
DescriptionA vulnerability in some versions of Microsoft Team Foundation Server could lead to remote code execution.
ObservationA vulnerability in some versions of Microsoft Team Foundation Server could lead to remote code execution.
The flaw lies due to Improperly Sanitize Input component. Successful exploitation by a remote attacker could result in the execution of arbitrary code. The exploit requires the user to open a vulnerable website, email or document.
25595 - (MSPT-Sep2019) Microsoft Azure DevOps Server and Team Foundation Server Improperly Validate Input RemoteCode Execution (CVE-201
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: HighCVE: CVE-2019-1306
DescriptionA vulnerability in some versions of Microsoft Azure DevOps Server and Team Foundation Server could lead to remote code execution.
ObservationA vulnerability in some versions of Microsoft Azure DevOps Server and Team Foundation Server could lead to remote code execution.
The flaw lies due to improperly validate input. Successful exploitation by a remote attacker could result in the execution of arbitrary code. The exploit requires the user to open a vulnerable website, email or document.
25598 - (MSPT-Sep2019) Microsoft Windows Jet Database Engine Remote Code Execution (CVE-2019-1240)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: HighCVE: CVE-2019-1240
DescriptionA vulnerability in some versions of Microsoft Windows could lead to remote code execution.
ObservationA vulnerability in some versions of Microsoft Windows could lead to remote code execution.
The flaw lies in the Jet Database Engine component. Successful exploitation by an attacker could result in the execution of arbitrary code. The exploit requires the user to open a vulnerable website, email or document.
25599 - (MSPT-Sep2019) Microsoft Windows Jet Database Engine Remote Code Execution (CVE-2019-1241)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: HighCVE: CVE-2019-1241
DescriptionA vulnerability in some versions of Microsoft Windows could lead to remote code execution.
ObservationA vulnerability in some versions of Microsoft Windows could lead to remote code execution.
The flaw lies in the Jet Database Engine component. Successful exploitation by an attacker could result in the execution of arbitrary code. The exploit requires the user to open a vulnerable website, email or document.
25600 - (MSPT-Sep2019) Microsoft Windows Jet Database Engine Remote Code Execution (CVE-2019-1242)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: HighCVE: CVE-2019-1242
DescriptionA vulnerability in some versions of Microsoft Windows could lead to remote code execution.
ObservationA vulnerability in some versions of Microsoft Windows could lead to remote code execution.
The flaw lies in the Jet Database Engine component. Successful exploitation by an attacker could result in the execution of arbitrary code. The exploit requires the user to open a vulnerable website, email or document.
25601 - (MSPT-Sep2019) Microsoft Windows Jet Database Engine Remote Code Execution (CVE-2019-1243)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: HighCVE: CVE-2019-1243
DescriptionA vulnerability in some versions of Microsoft Windows could lead to remote code execution.
ObservationA vulnerability in some versions of Microsoft Windows could lead to remote code execution.
The flaw lies in the Jet Database Engine component. Successful exploitation by an attacker could result in the execution of arbitrary code. The exploit requires the user to open a vulnerable website, email or document.
25602 - (MSPT-Sep2019) Microsoft Windows Jet Database Engine Remote Code Execution (CVE-2019-1246)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: HighCVE: CVE-2019-1246
DescriptionA vulnerability in some versions of Microsoft Windows could lead to remote code execution.
ObservationA vulnerability in some versions of Microsoft Windows could lead to remote code execution.
The flaw lies in the Jet Database Engine component. Successful exploitation by an attacker could result in the execution of arbitrary code. The exploit requires the user to open a vulnerable website, email or document.
25603 - (MSPT-Sep2019) Microsoft Windows Jet Database Engine Remote Code Execution (CVE-2019-1247)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: HighCVE: CVE-2019-1247
DescriptionA vulnerability in some versions of Microsoft Windows could lead to remote code execution.
ObservationA vulnerability in some versions of Microsoft Windows could lead to remote code execution.
The flaw lies in the Jet Database Engine component. Successful exploitation by an attacker could result in the execution of arbitrary code. The exploit requires the user to open a vulnerable website, email or document.
25604 - (MSPT-Sep2019) Microsoft Windows Jet Database Engine Remote Code Execution (CVE-2019-1248)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: HighCVE: CVE-2019-1248
DescriptionA vulnerability in some versions of Microsoft Windows could lead to remote code execution.
ObservationA vulnerability in some versions of Microsoft Windows could lead to remote code execution.
The flaw lies in the Jet Database Engine component. Successful exploitation by an attacker could result in the execution of arbitrary code. The exploit requires the user to open a vulnerable website, email or document.
25605 - (MSPT-Sep2019) Microsoft Windows Jet Database Engine Remote Code Execution (CVE-2019-1249)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: HighCVE: CVE-2019-1249
DescriptionA vulnerability in some versions of Microsoft Windows could lead to remote code execution.
ObservationA vulnerability in some versions of Microsoft Windows could lead to remote code execution.
The flaw lies in the Jet Database Engine component. Successful exploitation by an attacker could result in the execution of arbitrary code. The exploit requires the user to open a vulnerable website, email or document.
25606 - (MSPT-Sep2019) Microsoft Windows Jet Database Engine Remote Code Execution (CVE-2019-1250)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: HighCVE: CVE-2019-1250
DescriptionA vulnerability in some versions of Microsoft Windows could lead to remote code execution.
Observation
A vulnerability in some versions of Microsoft Windows could lead to remote code execution.
The flaw lies in the Jet Database Engine component. Successful exploitation by an attacker could result in the execution of arbitrary code. The exploit requires the user to open a vulnerable website, email or document.
25612 - (MSPT-Sep2019) Microsoft Windows .LNK Remote Code Execution (CVE-2019-1280)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: HighCVE: CVE-2019-1280
DescriptionA vulnerability in some versions of Microsoft Windows could lead to remote code execution.
ObservationA vulnerability in some versions of Microsoft Windows could lead to remote code execution.
The flaw lies in the .LNK file processing. Successful exploitation by an attacker could result in the execution of arbitrary code. The exploit requires the user to open a vulnerable website, email or document.
25615 - (MSPT-Sep2019) Microsoft Windows Denial of Service Vulnerability (CVE-2019-1292)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: HighCVE: CVE-2019-1292
DescriptionA vulnerability in some versions of Microsoft Windows could lead to a denial of service.
ObservationA vulnerability in some versions of Microsoft Windows could lead to a denial of service.
The flaw lies due to improperly handle objects in memory. Successful exploitation by a remote attacker could result in a denial of service condition. The exploit requires the attacker to have valid credentials to the vulnerable system.
25624 - (MSPT-Sep2019) Microsoft Windows Remote Desktop Services Remote Code Execution (CVE-2019-0787)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: HighCVE: CVE-2019-0787
DescriptionA vulnerability in some versions of Microsoft Windows could lead to remote code execution.
ObservationA vulnerability in some versions of Microsoft Windows could lead to remote code execution.
The flaw lies in the Remote Desktop Services component. Successful exploitation by a remote attacker could result in the execution of arbitrary code.
25625 - (MSPT-Sep2019) Microsoft Windows Remote Desktop Services Remote Code Execution (CVE-2019-0788)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: HighCVE: CVE-2019-0788
DescriptionA vulnerability in some versions of Microsoft Windows could lead to remote code execution.
ObservationA vulnerability in some versions of Microsoft Windows could lead to remote code execution.
The flaw lies in the Remote Desktop Services component. Successful exploitation by a remote attacker could result in the execution of arbitrary code.
25626 - (MSPT-Sep2019) Microsoft Windows Remote Desktop Services Remote Code Execution (CVE-2019-1290)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: HighCVE: CVE-2019-1290
DescriptionA vulnerability in some versions of Microsoft Windows could lead to remote code execution.
ObservationA vulnerability in some versions of Microsoft Windows could lead to remote code execution.
The flaw lies in the Remote Desktop Services component. Successful exploitation by a remote attacker could result in the execution of arbitrary code. The exploit requires the attacker to have valid credentials to the vulnerable system.
25627 - (MSPT-Sep2019) Microsoft Windows Remote Desktop Services Remote Code Execution (CVE-2019-1291)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: HighCVE: CVE-2019-1291
DescriptionA vulnerability in some versions of Microsoft Windows could lead to remote code execution.
ObservationA vulnerability in some versions of Microsoft Windows could lead to remote code execution.
The flaw lies in the Remote Desktop Services component. Successful exploitation by a remote attacker could result in the execution of arbitrary code. The exploit requires the attacker to have valid credentials to the vulnerable system.
25629 - (MSPT-Sep2019) Microsoft Edge Chakra Remote Code Execution (CVE-2019-1138)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: High
CVE: CVE-2019-1138
DescriptionA vulnerability in some versions of Microsoft Edge could lead to remote code execution.
ObservationA vulnerability in some versions of Microsoft Edge could lead to remote code execution.
The flaw lies in the Chakra component. Successful exploitation by a remote attacker could result in the execution of arbitrary code. The exploit requires the user to open a vulnerable website, email or document.
25630 - (MSPT-Sep2019) Microsoft Edge Chakra Remote Code Execution (CVE-2019-1217)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: HighCVE: CVE-2019-1217
DescriptionA vulnerability in some versions of Microsoft Edge could lead to remote code execution.
ObservationA vulnerability in some versions of Microsoft Edge could lead to remote code execution.
The flaw lies in the Chakra component. Successful exploitation by a remote attacker could result in the execution of arbitrary code. The exploit requires the user to open a vulnerable website, email or document.
25631 - (MSPT-Sep2019) Microsoft Edge Chakra Remote Code Execution (CVE-2019-1237)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: HighCVE: CVE-2019-1237
DescriptionA vulnerability in some versions of Microsoft Edge could lead to remote code execution.
ObservationA vulnerability in some versions of Microsoft Edge could lead to remote code execution.
The flaw lies in the Chakra component. Successful exploitation by a remote attacker could result in the execution of arbitrary code. The exploit requires the user to open a vulnerable website, email or document.
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: HighCVE: CVE-2019-1298
DescriptionA vulnerability in some versions of Microsoft Edge could lead to remote code execution.
ObservationA vulnerability in some versions of Microsoft Edge could lead to remote code execution.
The flaw lies in the Scripting Engine component. Successful exploitation by a remote attacker could result in the execution of arbitrary code. The exploit requires the user to open a vulnerable website, email or document.
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: HighCVE: CVE-2019-1300
DescriptionA vulnerability in some versions of Microsoft ChakraCore could lead to remote code execution.
ObservationA vulnerability in some versions of Microsoft ChakraCore could lead to remote code execution.
The flaw lies in the Scripting Engine component. Successful exploitation by a remote attacker could result in the execution of arbitrary code. The exploit requires the user to open a vulnerable website, email or document.
25635 - (MSPT-Sep2019) Microsoft Hyper-V Properly Validate Input Denial of Service (CVE-2019-0928)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: HighCVE: CVE-2019-0928
DescriptionA vulnerability in some versions of Microsoft Hyper-V could lead to a denial of service.
ObservationA vulnerability in some versions of Microsoft Hyper-V could lead to a denial of service.
The flaw lies in the Properly Validate Input component. Successful exploitation by a remote attacker could result in a denial of service condition. The exploit requires the attacker to have valid credentials to the vulnerable system.
25638 - (MSPT-Sep2019) Microsoft Excel Improperly Handle Objects in Memory Remote Code Execution (CVE-2019-1297)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: HighCVE: CVE-2019-1297
DescriptionA vulnerability in some versions of Microsoft Excel could lead to remote code execution.
ObservationA vulnerability in some versions of Microsoft Excel could lead to remote code execution.
The flaw lies due to improperly handle objects in memory. Successful exploitation by a remote attacker could result in the execution of arbitrary code. The exploit requires the user to open a vulnerable website, email or document.
25642 - (MSPT-Sep2019) Microsoft SharePoint Remote Code Execution (CVE-2019-1257)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: HighCVE: CVE-2019-1257
DescriptionA vulnerability in some versions of Microsoft SharePoint could lead to remote code execution.
ObservationA vulnerability in some versions of Microsoft SharePoint could lead to remote code execution.
The flaw lies in the Application Package component. Successful exploitation by a remote attacker could result in the execution of arbitrary code. The exploit requires the user to open a vulnerable website, email or document.
25647 - (MSPT-Sep2019) Microsoft SharePoint Remote Code Execution Vulnerability (CVE-2019-1295)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: HighCVE: CVE-2019-1295
DescriptionA vulnerability in some versions of Microsoft SharePoint could lead to remote code execution.
ObservationA vulnerability in some versions of Microsoft SharePoint could lead to remote code execution.
The flaw lies in the Unsafe APIs component. Successful exploitation by a remote attacker could result in the execution of arbitrary code. The exploit requires the user to open a vulnerable website, email or document.
25648 - (MSPT-Sep2019) Microsoft SharePoint Remote Code Execution Vulnerability (CVE-2019-1296)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: HighCVE: CVE-2019-1296
DescriptionA vulnerability in some versions of Microsoft SharePoint could lead to remote code execution.
ObservationA vulnerability in some versions of Microsoft SharePoint could lead to remote code execution.
The flaw lies in the Unsafe APIs component. Successful exploitation by a remote attacker could result in the execution of arbitrary code. The exploit requires the user to open a vulnerable website, email or document.
25649 - (MSPT-Sep2019) Microsoft VBScript Improperly Handles Objects in Memory Remote Code Execution (CVE-2019-1220)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)
Risk Level: HighCVE: CVE-2019-1220
DescriptionA vulnerability in some versions of Microsoft VBScript could lead to remote code execution.
ObservationA vulnerability in some versions of Microsoft VBScript could lead to remote code execution.
The flaw lies due to Improperly Handles Objects in Memory. Successful exploitation by a remote attacker could result in the execution of arbitrary code. The exploit requires the user to open a vulnerable website, email or document.
25650 - (MSPT-Sep2019) Microsoft Explorer Improperly Handles Objects in Memory Remote Code Execution (CVE-2019-1221)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: HighCVE: CVE-2019-1221
DescriptionA vulnerability in some versions of Microsoft Explorer could lead to remote code execution.
ObservationA vulnerability in some versions of Microsoft Explorer could lead to remote code execution.
The flaw lies in the Improperly Handles Objects in Memory component. Successful exploitation by a remote attacker could result in the execution of arbitrary code. The exploit requires the user to open a vulnerable website, email or document.
131418 - Debian Linux 10.0, 9.0 DSA-4519-1 Update Is Not Installed
SuSE Linux 15.0x86_64chromedriver-76.0.3809.132-lp150.234.1chromedriver-debuginfo-76.0.3809.132-lp150.234.1chromium-76.0.3809.132-lp150.234.1chromium-debuginfo-76.0.3809.132-lp150.234.1chromium-debugsource-76.0.3809.132-lp150.234.1
148293 - SuSE SLES 12 SP4, SLED 12 SP4 SUSE-SU-2019:2347-1 Update Is Not Installed
SuSE Linux 15.1x86_64libsrt1-debuginfo-1.3.4-lp151.2.3.1srt-debuginfo-1.3.4-lp151.2.3.1srt-1.3.4-lp151.2.3.1srt-debugsource-1.3.4-lp151.2.3.1libsrt1-1.3.4-lp151.2.3.1srt-devel-1.3.4-lp151.2.3.1
148295 - SuSE Linux 15.1 openSUSE-SU-2019:2080-1 Update Is Not Installed
SuSE Linux 15.1i586libblkid-devel-2.33.1-lp151.3.3.2util-linux-systemd-2.33.1-lp151.3.3.2libsmartcols-devel-2.33.1-lp151.3.3.2util-linux-systemd-debugsource-2.33.1-lp151.3.3.2libfdisk1-debuginfo-2.33.1-lp151.3.3.2util-linux-systemd-debuginfo-2.33.1-lp151.3.3.2shadow-4.6-lp151.2.3.2libuuid-devel-2.33.1-lp151.3.3.2libmount1-2.33.1-lp151.3.3.2libfdisk1-2.33.1-lp151.3.3.2util-linux-debugsource-2.33.1-lp151.3.3.2libblkid1-2.33.1-lp151.3.3.2libblkid1-debuginfo-2.33.1-lp151.3.3.2libmount-devel-static-2.33.1-lp151.3.3.2libuuid1-2.33.1-lp151.3.3.2uuidd-debuginfo-2.33.1-lp151.3.3.2libblkid-devel-static-2.33.1-lp151.3.3.2shadow-debugsource-4.6-lp151.2.3.2shadow-debuginfo-4.6-lp151.2.3.2libfdisk-devel-static-2.33.1-lp151.3.3.2libmount1-debuginfo-2.33.1-lp151.3.3.2util-linux-debuginfo-2.33.1-lp151.3.3.2libuuid-devel-static-2.33.1-lp151.3.3.2libsmartcols1-debuginfo-2.33.1-lp151.3.3.2util-linux-2.33.1-lp151.3.3.2uuidd-2.33.1-lp151.3.3.2libsmartcols-devel-static-2.33.1-lp151.3.3.2libuuid1-debuginfo-2.33.1-lp151.3.3.2libmount-devel-2.33.1-lp151.3.3.2libfdisk-devel-2.33.1-lp151.3.3.2libsmartcols1-2.33.1-lp151.3.3.2
SuSE Linux 15.0x86_64libmirage-debuginfo-3.2.2-lp150.2.6.1typelib-1_0-libmirage-3_2-3.2.2-lp150.2.6.1libmirage11-3.2.2-lp150.2.6.1libmirage-devel-3.2.2-lp150.2.6.1
SuSE Linux 15.1x86_64libmirage-devel-3.2.2-lp151.3.6.1libmirage-3_2-debuginfo-3.2.2-lp151.3.6.1libmirage11-3.2.2-lp151.3.6.1libmirage-debuginfo-3.2.2-lp151.3.6.1libmirage11-debuginfo-3.2.2-lp151.3.6.1libmirage-debugsource-3.2.2-lp151.3.6.1typelib-1_0-libmirage-3_2-3.2.2-lp151.3.6.1libmirage-3_2-3.2.2-lp151.3.6.1
SuSE Linux 15.0i586nodejs8-debugsource-8.16.1-lp150.2.19.1nodejs8-devel-8.16.1-lp150.2.19.1nodejs8-8.16.1-lp150.2.19.1npm8-8.16.1-lp150.2.19.1nodejs8-debuginfo-8.16.1-lp150.2.19.1
SuSE Linux 15.1i586nodejs8-debugsource-8.16.1-lp151.2.6.1nodejs8-debuginfo-8.16.1-lp151.2.6.1nodejs8-devel-8.16.1-lp151.2.6.1npm8-8.16.1-lp151.2.6.1nodejs8-8.16.1-lp151.2.6.1
SuSE Linux 15.0x86_64nodejs10-10.16.3-lp150.5.1npm10-10.16.3-lp150.5.1nodejs10-debuginfo-10.16.3-lp150.5.1nodejs10-devel-10.16.3-lp150.5.1nodejs10-debugsource-10.16.3-lp150.5.1
SuSE Linux 15.1x86_64python-Twisted-doc-17.9.0-lp151.3.6.1python3-Twisted-17.9.0-lp151.3.6.1python2-Twisted-17.9.0-lp151.3.6.1python3-Twisted-debuginfo-17.9.0-lp151.3.6.1python-Twisted-debuginfo-17.9.0-lp151.3.6.1python2-Twisted-debuginfo-17.9.0-lp151.3.6.1python-Twisted-debugsource-17.9.0-lp151.3.6.1
SuSE Linux 15.0x86_64libSDL2_image-2_0-0-32bit-debuginfo-2.0.5-lp150.9.1libSDL2_image-2_0-0-2.0.5-lp150.9.1libSDL2_image-2_0-0-debuginfo-2.0.5-lp150.9.1libSDL2_image-2_0-0-32bit-2.0.5-lp150.9.1libSDL2_image-devel-2.0.5-lp150.9.1SDL2_image-debugsource-2.0.5-lp150.9.1libSDL2_image-devel-32bit-2.0.5-lp150.9.1
SuSE Linux 15.1x86_64libSDL2_image-2_0-0-2.0.5-lp151.2.5.1libSDL2_image-2_0-0-32bit-debuginfo-2.0.5-lp151.2.5.1libSDL2_image-devel-32bit-2.0.5-lp151.2.5.1libSDL2_image-2_0-0-32bit-2.0.5-lp151.2.5.1SDL2_image-debugsource-2.0.5-lp151.2.5.1libSDL2_image-devel-2.0.5-lp151.2.5.1libSDL2_image-2_0-0-debuginfo-2.0.5-lp151.2.5.1
DescriptionThe scan detected that the host is missing the following update:oniguruma -- multiple vulnerabilities (a8d87c7a-d1b1-11e9-a616-0992a4564e7c)
ObservationUpdates often remediate critical security problems that should be quickly addressed.For more information see:
DescriptionThe scan detected that the host is missing the following update:xymon-server -- multiple vulnerabilities (10e1d580-d174-11e9-a87f-a4badb2f4699)
ObservationUpdates often remediate critical security problems that should be quickly addressed.For more information see:
25643 - (MSPT-Sep2019) Microsoft SharePoint Spoofing Vulnerability (CVE-2019-1259)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1259
DescriptionA vulnerability in some versions of Microsoft SharePoint could lead to spoofing.
ObservationA vulnerability in some versions of Microsoft SharePoint could lead to spoofing.
The flaw is due to Improper Handling of Requests To Authorize Applications. Successful exploitation by a remote attacker could result in spoofing The exploit requires the user to open a vulnerable website, email or document.
148310 - SuSE Linux 15.0, 15.1 openSUSE-SU-2019:2071-1 Update Is Not Installed
SuSE Linux 15.0x86_64libSDL_image-1_2-0-32bit-1.2.12+hg695-lp150.2.3.1libSDL_image-devel-32bit-1.2.12+hg695-lp150.2.3.1SDL_image-debugsource-1.2.12+hg695-lp150.2.3.1libSDL_image-1_2-0-32bit-debuginfo-1.2.12+hg695-lp150.2.3.1libSDL_image-1_2-0-1.2.12+hg695-lp150.2.3.1libSDL_image-devel-1.2.12+hg695-lp150.2.3.1libSDL_image-1_2-0-debuginfo-1.2.12+hg695-lp150.2.3.1
SuSE Linux 15.1x86_64libSDL_image-devel-32bit-1.2.12+hg695-lp151.3.3.1libSDL_image-1_2-0-debuginfo-1.2.12+hg695-lp151.3.3.1libSDL_image-1_2-0-32bit-1.2.12+hg695-lp151.3.3.1SDL_image-debugsource-1.2.12+hg695-lp151.3.3.1libSDL_image-devel-1.2.12+hg695-lp151.3.3.1libSDL_image-1_2-0-32bit-debuginfo-1.2.12+hg695-lp151.3.3.1libSDL_image-1_2-0-1.2.12+hg695-lp151.3.3.1
25571 - (MSPT-Sep2019) Microsoft DirectWrite Improperly Discloses the Contents of Its Memory Information Disclosure(CVE-2019-1244)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1244
DescriptionA vulnerability in some versions of Microsoft DirectWrite could lead to information disclosure.
ObservationA vulnerability in some versions of Microsoft DirectWrite could lead to information disclosure.
The flaw lies in the Improperly Discloses the Contents of Its Memory component. Successful exploitation by a remote attacker could result in the disclosure of sensitive information. The exploit requires the user to open a vulnerable website, email or document.
25572 - (MSPT-Sep2019) Microsoft DirectWrite Improperly Discloses the Contents of Its Memory Information Disclosure(CVE-2019-1245)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1245
DescriptionA vulnerability in some versions of Microsoft DirectWrite could lead to information disclosure.
ObservationA vulnerability in some versions of Microsoft DirectWrite could lead to information disclosure.
The flaw lies in the Improperly Discloses the Contents of Its Memory component. Successful exploitation by a remote attacker could result in the disclosure of sensitive information. The exploit requires the user to open a vulnerable website, email or document.
25573 - (MSPT-Sep2019) Microsoft DirectWrite Improperly Handles Objects in Memory Information Disclosure (CVE-2019-1251)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1251
DescriptionA vulnerability in some versions of Microsoft DirectWrite could lead to information disclosure.
ObservationA vulnerability in some versions of Microsoft DirectWrite could lead to information disclosure.
The flaw lies in the Improperly Handles Objects in Memory component. Successful exploitation by a remote attacker could result in the disclosure of sensitive information. The exploit requires the user to open a vulnerable website, email or document.
25574 - (MSPT-Sep2019) Microsoft Windows Win32k Privilege Escalation (CVE-2019-1256)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1256
DescriptionA vulnerability in some versions of Microsoft Windows could lead to privilege escalation.
ObservationA vulnerability in some versions of Microsoft Windows could lead to privilege escalation.
The flaw lies in the Win32k component. Successful exploitation could allow a local user to gain elevated privileges. The exploit requires the attacker to have valid credentials to the vulnerable system.
25575 - (MSPT-Sep2019) Microsoft Windows Win32k Privilege Escalation (CVE-2019-1285)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1285
DescriptionA vulnerability in some versions of Microsoft Windows could lead to privilege escalation.
ObservationA vulnerability in some versions of Microsoft Windows could lead to privilege escalation.
The flaw lies in the Win32k component. Successful exploitation could allow a local user to gain elevated privileges. The exploit requires the attacker to have valid credentials to the vulnerable system.
25576 - (MSPT-Sep2019) Microsoft Windows ALPC Privilege Escalation (CVE-2019-1269)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1269
DescriptionA vulnerability in some versions of Microsoft Windows could lead to privilege escalation.
ObservationA vulnerability in some versions of Microsoft Windows could lead to privilege escalation.
The flaw lies in the ALPC component. Successful exploitation could allow a local user to gain elevated privileges. The exploit requires the attacker to have valid credentials to the vulnerable system.
25577 - (MSPT-Sep2019) Microsoft Windows ALPC Privilege Escalation (CVE-2019-1272)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1272
DescriptionA vulnerability in some versions of Microsoft Windows could lead to privilege escalation.
ObservationA vulnerability in some versions of Microsoft Windows could lead to privilege escalation.
The flaw lies in the ALPC component. Successful exploitation could allow a local user to gain elevated privileges. The exploit requires the attacker to have valid credentials to the vulnerable system.
25578 - (MSPT-Sep2019) Microsoft Windows AppX Deployment Server Privilege Escalation (CVE-2019-1253)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1253
DescriptionA vulnerability in some versions of Microsoft Windows could lead to privilege escalation.
ObservationA vulnerability in some versions of Microsoft Windows could lead to privilege escalation.
The flaw lies in the AppX Deployment Server component. Successful exploitation could allow a local user to gain elevated privileges. The exploit requires the attacker to have valid credentials to the vulnerable system.
25579 - (MSPT-Sep2019) Microsoft Windows AppX Deployment Server Privilege Escalation (CVE-2019-1303)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1303
DescriptionA vulnerability in some versions of Microsoft Windows could lead to privilege escalation.
ObservationA vulnerability in some versions of Microsoft Windows could lead to privilege escalation.
The flaw lies in the AppX Deployment Server component. Successful exploitation could allow a local user to gain elevated privileges. The exploit requires the attacker to have valid credentials to the vulnerable system.
25580 - (MSPT-Sep2019) Microsoft Windows GDI Information Disclosure (CVE-2019-1252)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1252
DescriptionA vulnerability in some versions of Microsoft Windows could lead to information disclosure.
ObservationA vulnerability in some versions of Microsoft Windows could lead to information disclosure.
The flaw lies in the GDI component. Successful exploitation by a remote attacker could result in the disclosure of sensitive information. The exploit requires the user to open a vulnerable website, email or document.
25581 - (MSPT-Sep2019) Microsoft Windows GDI Information Disclosure (CVE-2019-1286)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1286
DescriptionA vulnerability in some versions of Microsoft Windows could lead to information disclosure.
ObservationA vulnerability in some versions of Microsoft Windows could lead to information disclosure.
The flaw lies in the GDI component. Successful exploitation by a remote attacker could result in the disclosure of sensitive information. The exploit requires the user to open a vulnerable website, email or document.
25584 - (MSPT-Sep2019) Microsoft Windows Secure Boot Security Bypass (CVE-2019-1294)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)
Risk Level: MediumCVE: CVE-2019-1294
DescriptionA vulnerability in some versions of Microsoft Windows could lead to security bypass.
ObservationA vulnerability in some versions of Microsoft Windows could lead to security bypass.
The flaw lies in the Secure Boot component. Successful exploitation by a remote attacker could result in the bypass of intended access restrictions. The exploit requires the attacker to have valid credentials to the vulnerable system.
25585 - (MSPT-Sep2019) Microsoft Windows Store Installer Privilege Escalation (CVE-2019-1270)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1270
DescriptionA vulnerability in some versions of Microsoft Windows could lead to privilege escalation.
ObservationA vulnerability in some versions of Microsoft Windows could lead to privilege escalation.
The flaw lies in the Store Installer component. Successful exploitation could allow a local user to gain elevated privileges. The exploit requires the attacker to have valid credentials to the vulnerable system.
25586 - (MSPT-Sep2019) Microsoft Windows IME Privilege Escalation (CVE-2019-1235)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1235
DescriptionA vulnerability in some versions of Microsoft IME could lead to privilege escalation.
ObservationA vulnerability in some versions of Microsoft IME could lead to privilege escalation.
The flaw lies in the IME component. Successful exploitation could allow a local user to gain elevated privileges. The exploit requires the attacker to have valid credentials to the vulnerable system.
25587 - (MSPT-Sep2019) Microsoft Windows Update Delivery Optimization Privilege Escalation (CVE-2019-1289)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1289
DescriptionA vulnerability in some versions of Microsoft Windows could lead to privilege escalation.
ObservationA vulnerability in some versions of Microsoft Windows could lead to privilege escalation.
The flaw lies in the Update Delivery Optimization component. Successful exploitation could allow a local user to gain elevated privileges. The exploit requires the attacker to have valid credentials to the vulnerable system.
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1268
DescriptionA vulnerability in some versions of Microsoft Winlogon could lead to privilege escalation.
ObservationA vulnerability in some versions of Microsoft Winlogon could lead to privilege escalation.
The flaw lies due to improperly handle file. Successful exploitation could allow a local user to gain elevated privileges. The exploit requires the attacker to have valid credentials to the vulnerable system.
25590 - (MSPT-Sep2019) Microsoft ws2ifsl.sys Improperly Handles Objects in Memory Privilege Escalation (CVE-2019-1215)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1215
DescriptionA vulnerability in some versions of Microsoft ws2ifsl.sys could lead to privilege escalation.
ObservationA vulnerability in some versions of Microsoft ws2ifsl.sys could lead to privilege escalation.
The flaw lies in the Improperly Handles Objects in Memory component. Successful exploitation could allow a local user to gain elevated privileges. The exploit requires the attacker to have valid credentials to the vulnerable system.
25592 - (MSPT-Sep2019) Microsoft Exchange Server Outlook Web Access Spoofing (CVE-2019-1266)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1266
DescriptionA vulnerability in some versions of Microsoft Exchange Server could lead to spoofing.
ObservationA vulnerability in some versions of Microsoft Exchange Server could lead to spoofing.
The flaw lies in the Outlook Web Access component. Successful exploitation by a remote attacker could result in spoofing. The exploit requires the user to open a vulnerable website, email or document.
25593 - (MSPT-Sep2019) Microsoft Windows Lync 2013 Information Disclosure (CVE-2019-1209)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1209
DescriptionA vulnerability in some versions of Microsoft Windows could lead to information disclosure.
ObservationA vulnerability in some versions of Microsoft Windows could lead to information disclosure.
The flaw lies in the Lync 2013 component. Successful exploitation by a remote attacker could result in the disclosure of sensitive information. The exploit requires the user to open a vulnerable website, email or document.
25607 - (MSPT-Sep2019) Microsoft Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability (CVE-2019-1232)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1232
DescriptionA vulnerability in some versions of Microsoft Diagnostics Hub Standard Collector Service could lead to privilege escalation.
ObservationA vulnerability in some versions of Microsoft Diagnostics Hub Standard Collector Service could lead to privilege escalation.
The flaw lies in the Improperly Impersonates File Operations. Successful exploitation could allow a local user to gain elevated privileges. The exploit requires the attacker to have valid credentials to the vulnerable system.
25608 - (MSPT-Sep2019) Microsoft Microsoft Compatibility Appraiser Elevation of Privilege Vulnerability (CVE-2019-1267)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1267
DescriptionA vulnerability in some versions of Microsoft Compatibility Appraiser could lead to privilege escalation.
ObservationA vulnerability in some versions of Microsoft Compatibility Appraiser could lead to privilege escalation.
The flaw lies in the Symbolic Hardlink Attack component. Successful exploitation could allow a local user to gain elevated privileges. The exploit requires the attacker to have valid credentials to the vulnerable system.
25609 - (MSPT-Sep2019) Microsoft Windows Media Elevation of Privilege Vulnerability (CVE-2019-1271)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1271
DescriptionA vulnerability in some versions of Microsoft Windows could lead to privilege escalation.
ObservationA vulnerability in some versions of Microsoft Windows could lead to privilege escalation.
The flaw lies in the hdAudio.sys component. Successful exploitation could allow a local user to gain elevated privileges. The exploit requires the attacker to have valid credentials to the vulnerable system.
25610 - (MSPT-Sep2019) Microsoft Active Directory Federation Services XSS Vulnerability (CVE-2019-1273)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1273
DescriptionA vulnerability in some versions of Microsoft ADFS could lead to XSS.
ObservationA vulnerability in some versions of Microsoft ADFS could lead to XSS.
The flaw lies due to improperly sanitize error messages. Successful exploitation by a remote attacker could result in XSS attacks. The exploit requires the attacker to have valid credentials to the vulnerable system.
25611 - (MSPT-Sep2019) Microsoft Windows Audio Service Elevation of Privilege Vulnerability (CVE-2019-1277)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1277
DescriptionA vulnerability in some versions of Microsoft Windows could lead to privilege escalation.
ObservationA vulnerability in some versions of Microsoft Windows could lead to privilege escalation.
The flaw lies in the Audio Service component. Successful exploitation could allow a local user to gain elevated privileges. The exploit requires the attacker to have valid credentials to the vulnerable system.
25613 - (MSPT-Sep2019) Microsoft Graphics Components Information Disclosure Vulnerability (CVE-2019-1283)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1283
DescriptionA vulnerability in some versions of Microsoft Graphics Components could lead to information disclosure.
ObservationA vulnerability in some versions of Microsoft Graphics Components could lead to information disclosure.
The flaw lies due to improper handling of objects in memory. Successful exploitation by an attacker could result in the disclosure of sensitive information. The exploit requires the user to open a vulnerable website, email or document.
25614 - (MSPT-Sep2019) Microsoft Windows Network Connectivity Assistant Privilege Escalation (CVE-2019-1287)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1287
DescriptionA vulnerability in some versions of Microsoft Windows could lead to privilege escalation.
ObservationA vulnerability in some versions of Microsoft Windows could lead to privilege escalation.
The flaw lies in the Network Connectivity Assistant component. Successful exploitation could allow a local user to gain elevated privileges. The exploit requires the attacker to have valid credentials to the vulnerable system.
25616 - (MSPT-Sep2019) Microsoft .NET Framework CLR Privilege Escalation (CVE-2019-1142)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1142
DescriptionA vulnerability in some versions of Microsoft .NET Framework could lead to privilege escalation.
ObservationA vulnerability in some versions of Microsoft .NET Framework could lead to privilege escalation.
The flaw lies in the CLR component. Successful exploitation could allow a local user to gain elevated privileges. The exploit requires the attacker to have valid credentials to the vulnerable system.
25617 - (MSPT-Sep2019) Microsoft CLFS Improperly Handles Objects in Memory Privilege Escalation (CVE-2019-1214)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1214
DescriptionA vulnerability in some versions of Microsoft CLFS could lead to privilege escalation.
Observation
A vulnerability in some versions of Microsoft CLFS could lead to privilege escalation.
The flaw lies in the Improperly Handles Objects in Memory component. Successful exploitation could allow a local user to gain elevated privileges. The exploit requires the attacker to have valid credentials to the vulnerable system.
25618 - (MSPT-Sep2019) Microsoft CLFS Improperly Handles Objects in Memory Improperly Handles Objects in MemoryInformation Disclosure (
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1219
DescriptionA vulnerability in some versions of Microsoft CLFS could lead to information disclosure.
ObservationA vulnerability in some versions of Microsoft CLFS could lead to information disclosure.
The flaw lies in the Improperly Handles Objects in Memory component. Successful exploitation by a remote attacker could result in the disclosure of sensitive information. The exploit requires the attacker to have valid credentials to the vulnerable system.
25619 - (MSPT-Sep2019) Microsoft Windows CLFS Security Bypass (CVE-2019-1282)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1282
DescriptionA vulnerability in some versions of Microsoft Windows could lead to security bypass.
ObservationA vulnerability in some versions of Microsoft Windows could lead to security bypass.
The flaw lies in the CLFS component. Successful exploitation by a remote attacker could result in the bypass of intended access restrictions. The exploit requires the attacker to have valid credentials to the vulnerable system.
25620 - (MSPT-Sep2019) Microsoft DirectX Improperly Handles Objects in Memory Information Disclosure (CVE-2019-1216)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1216
DescriptionA vulnerability in some versions of Microsoft DirectX could lead to information disclosure.
ObservationA vulnerability in some versions of Microsoft DirectX could lead to information disclosure.
The flaw lies in the Improperly Handles Objects in Memory component. Successful exploitation by a remote attacker could result in the disclosure of sensitive information. The exploit requires the attacker to have valid credentials to the vulnerable system.
25621 - (MSPT-Sep2019) Microsoft DirectX Improperly Handle Objects in Memory Privilege Escalation (CVE-2019-1284)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1284
DescriptionA vulnerability in some versions of Microsoft DirectX could lead to privilege escalation.
ObservationA vulnerability in some versions of Microsoft DirectX could lead to privilege escalation.
The flaw lies due to improperly handle objects in memory. Successful exploitation could allow a local user to gain elevated privileges. The exploit requires the attacker to have valid credentials to the vulnerable system.
25622 - (MSPT-Sep2019) Microsoft Windows Kernel Information Disclosure (CVE-2019-1274)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1274
DescriptionA vulnerability in some versions of Microsoft Windows could lead to information disclosure.
ObservationA vulnerability in some versions of Microsoft Windows could lead to information disclosure.
The flaw lies in the Kernel component. Successful exploitation by a remote attacker could result in the disclosure of sensitive information. The exploit requires the attacker to have valid credentials to the vulnerable system.
25623 - (MSPT-Sep2019) Microsoft Windows Kernel Information Disclosure (CVE-2019-1293)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1293
DescriptionA vulnerability in some versions of Microsoft Windows could lead to information disclosure.
ObservationA vulnerability in some versions of Microsoft Windows could lead to information disclosure.
The flaw lies in the Kernel component. Successful exploitation by a remote attacker could result in the disclosure of sensitive information. The exploit requires the attacker to have valid credentials to the vulnerable system.
25633 - (MSPT-Sep2019) Microsoft ChakraCore Improperly Handle Objects in Memory Information Disclosure (CVE-2019-1299)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)
Risk Level: MediumCVE: CVE-2019-1299
DescriptionA vulnerability in some versions of Microsoft ChakraCore could lead to information disclosure.
ObservationA vulnerability in some versions of Microsoft ChakraCore could lead to information disclosure.
The flaw lies due to improperly handle objects in memory. Successful exploitation by a remote attacker could result in the disclosure of sensitive information. The exploit requires the user to open a vulnerable website, email or document.
25636 - (MSPT-Sep2019) Microsoft Windows Hyper-V Information Disclosure (CVE-2019-1254)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1254
DescriptionA vulnerability in some versions of Microsoft Windows could lead to information disclosure.
ObservationA vulnerability in some versions of Microsoft Windows could lead to information disclosure.
The flaw lies in the Hyper-V component. Successful exploitation by a remote attacker could result in the disclosure of sensitive information. The exploit requires the attacker to have valid credentials to the vulnerable system.
25639 - (MSPT-Sep2019) Microsoft Excel Improperly Handle Objects in Memory Information Disclosure (CVE-2019-1263)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1263
DescriptionA vulnerability in some versions of Microsoft Excel could lead to information disclosure.
ObservationA vulnerability in some versions of Microsoft Excel could lead to information disclosure.
The flaw lies due to improperly handle objects in memory. Successful exploitation by a remote attacker could result in the disclosure of sensitive information. The exploit requires the user to open a vulnerable website, email or document.
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1264
DescriptionA vulnerability in some versions of Microsoft Office could lead to security bypass.
ObservationA vulnerability in some versions of Microsoft Office could lead to security bypass.
The flaw lies due to improperly handles input. Successful exploitation by a remote attacker could result in the bypass of intended access restrictions. The exploit requires the user to open a vulnerable website, email or document.
25644 - (MSPT-Sep2019) Microsoft SharePoint Privilege Escalation (CVE-2019-1260)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1260
DescriptionA vulnerability in some versions of Microsoft SharePoint could lead to privilege escalation.
ObservationA vulnerability in some versions of Microsoft SharePoint could lead to privilege escalation.
The flaw lies in the Sanitation of user input. Successful exploitation could allow a user to gain elevated privileges. The exploit requires the user to open a vulnerable website, email or document.
25645 - (MSPT-Sep2019) Microsoft SharePoint Spoofing Vulnerability (CVE-2019-1261)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1261
DescriptionA vulnerability in some versions of Microsoft SharePoint could lead to spoofing.
ObservationA vulnerability in some versions of Microsoft SharePoint could lead to spoofing.
The flaw lies due to improperly handles requests. Successful exploitation by a remote attacker could result in spoofing. The exploit requires the user to open a vulnerable website, email or document.
25646 - (MSPT-Sep2019) Microsoft Office SharePoint XSS Vulnerability (CVE-2019-1262)
Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS)Risk Level: MediumCVE: CVE-2019-1262
DescriptionA vulnerability in some versions of Microsoft SharePoint could lead to spoofing.
ObservationA vulnerability in some versions of Microsoft SharePoint could lead to spoofing.
The flaw lies due to improperly sanitize web request. Successful exploitation by a remote attacker could result in spoofing. The exploit
requires the user to open a vulnerable website, email or document.
178775 - Gentoo Linux GLSA-201909-03 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Gentoo Linux Patches and HotFixesRisk Level: MediumCVE: CVE-MAP-NOMATCH
DescriptionThe scan detected that the host is missing the following update:GLSA-201909-03
ObservationUpdates often remediate critical security problems that should be quickly addressed.For more information see:
https://security.gentoo.org/glsa/201909-03
Affected packages: x11-libs/pango < 1.42.4-r2
178776 - Gentoo Linux GLSA-201909-07 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Gentoo Linux Patches and HotFixesRisk Level: MediumCVE: CVE-MAP-NOMATCH
DescriptionThe scan detected that the host is missing the following update:GLSA-201909-07
ObservationUpdates often remediate critical security problems that should be quickly addressed.For more information see:
https://security.gentoo.org/glsa/201909-07
Affected packages: media-libs/libsdl2 < 2.0.10
178777 - Gentoo Linux GLSA-201909-01 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Gentoo Linux Patches and HotFixesRisk Level: MediumCVE: CVE-MAP-NOMATCH
DescriptionThe scan detected that the host is missing the following update:GLSA-201909-01
ObservationUpdates often remediate critical security problems that should be quickly addressed.For more information see:
https://security.gentoo.org/glsa/201909-01
Affected packages: dev-lang/perl < 5.28.2
178779 - Gentoo Linux GLSA-201909-02 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Gentoo Linux Patches and HotFixesRisk Level: MediumCVE: CVE-MAP-NOMATCH
DescriptionThe scan detected that the host is missing the following update:GLSA-201909-02
ObservationUpdates often remediate critical security problems that should be quickly addressed.For more information see:
https://security.gentoo.org/glsa/201909-02
Affected packages: media-video/vlc < 3.0.8
178780 - Gentoo Linux GLSA-201909-08 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Gentoo Linux Patches and HotFixesRisk Level: MediumCVE: CVE-MAP-NOMATCH
DescriptionThe scan detected that the host is missing the following update:GLSA-201909-08
ObservationUpdates often remediate critical security problems that should be quickly addressed.For more information see:
https://security.gentoo.org/glsa/201909-08
Affected packages: sys-apps/dbus < 1.12.16
178781 - Gentoo Linux GLSA-201909-05 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Gentoo Linux Patches and HotFixesRisk Level: MediumCVE: CVE-MAP-NOMATCH
DescriptionThe scan detected that the host is missing the following update:GLSA-201909-05
Observation
Updates often remediate critical security problems that should be quickly addressed.For more information see:
https://security.gentoo.org/glsa/201909-05
Affected packages: net-libs/webkit-gtk < 2.24.4
178782 - Gentoo Linux GLSA-201909-04 Update Is Not Installed
Category: SSH Module -> NonIntrusive -> Gentoo Linux Patches and HotFixesRisk Level: MediumCVE: CVE-MAP-NOMATCH
DescriptionThe scan detected that the host is missing the following update:GLSA-201909-04
ObservationUpdates often remediate critical security problems that should be quickly addressed.For more information see:
https://security.gentoo.org/glsa/201909-04
Affected packages: www-servers/apache < 2.4.41
186901 - Ubuntu Linux 16.04, 18.04 USN-4128-1 Update Is Not Installed
SuSE Linux 15.0x86_64libwavpack1-32bit-debuginfo-5.1.0-lp150.3.6.1wavpack-debuginfo-5.1.0-lp150.3.6.1wavpack-5.1.0-lp150.3.6.1libwavpack1-32bit-5.1.0-lp150.3.6.1wavpack-debugsource-5.1.0-lp150.3.6.1wavpack-devel-5.1.0-lp150.3.6.1libwavpack1-5.1.0-lp150.3.6.1libwavpack1-debuginfo-5.1.0-lp150.3.6.1
SuSE Linux 15.1x86_64wavpack-debugsource-5.1.0-lp151.5.3.1wavpack-5.1.0-lp151.5.3.1libwavpack1-32bit-debuginfo-5.1.0-lp151.5.3.1libwavpack1-debuginfo-5.1.0-lp151.5.3.1libwavpack1-5.1.0-lp151.5.3.1libwavpack1-32bit-5.1.0-lp151.5.3.1wavpack-debuginfo-5.1.0-lp151.5.3.1wavpack-devel-5.1.0-lp151.5.3.1
DescriptionThe scan detected that the host is missing the following update:Flash Player -- multiple vulnerabilities (c6f19fe6-d42a-11e9-b4f9-6451062f0f7a)
ObservationUpdates often remediate critical security problems that should be quickly addressed.For more information see:
DescriptionThe scan detected that the host is missing the following update:Exim -- RCE with root privileges in TLS SNI handler (61db9b88-d091-11e9-8d41-97657151f8c2)
ObservationUpdates often remediate critical security problems that should be quickly addressed.For more information see:
DescriptionThe scan detected that the host is missing the following update:asterisk -- Crash when negotiating for T.38 with a declined stream (d94c08d2-d079-11e9-8f1a-001999f8d30b)
ObservationUpdates often remediate critical security problems that should be quickly addressed.For more information see:
DescriptionThe scan detected that the host is missing the following update:asterisk -- Remote Crash Vulnerability in audio transcoding (7d53d8da-d07a-11e9-8f1a-001999f8d30b)
ObservationUpdates often remediate critical security problems that should be quickly addressed.For more information see:
FS1000 APPLIANCE customers should follow the instructions for Enterprise/Professional customers, below. In addition, we stronglyurge all appliance customers to authorize and install any Windows Update critical patches. The appliance will auto-download anycritical updates but will wait for your explicit authorization before installing.
FOUNDSTONE ENTERPRISE and PROFESSIONAL customers may obtain these new scripts using the FSUpdate Utility by selecting"FoundScan Update" on the help menu. Make sure that you have a valid FSUpdate username and password. The new vulnerabilityscripts will be automatically included in your scans if you have selected that option by right-clicking the selected vulnerability categoryand checking the "Run New Checks" checkbox.
MANAGED SERVICE CUSTOMERS already have the newest update applied to their environment. The new vulnerability scripts willbe automatically included when your scans are next scheduled, provided the Run New Scripts option has been turned on.
MCAFEE TECHNICAL SUPPORT
ServicePortal: https://mysupport.mcafee.comMulti-National Phone Support available here:
http://www.mcafee.com/us/about/contact/index.htmlNon-US customers - Select your country from the list of Worldwide Offices.
This email may contain confidential and privileged material for the sole use of the intended recipient. Any review or distribution byothers is strictly prohibited. If you are not the intended recipient please contact the sender and delete all copies.
Copyright 2019 McAfee, Inc.McAfee is a registered trademark of McAfee, Inc. and/or its affiliates