Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Checks version of First Response
Detailed Explanation for this Vulnerability Assessment
The remote Windows application is affected by multiple vulnerabilites.
The remote host contains a version of First Response, an incident
response tool, that is affected by multiple vulnerabilities.
If the First Response agent (fragent) is configured to listen for
remote SSL-enabled connections, it is reportedly possible to disable
the agent remotely by sending a series of specially-crafted requests,
thereby preventing legitimate connections from a First Response
Additionally, it is possible to hijack the agent by binding to the
same socket address on which it is already listening if it was bound
to the '0.0.0.0' wildcard address. A local attacker may be able to
leverage this flaw to deny service to the agent or to conduct a
man-in-the-middle attack against connecting clients.
See also :
Upgrade to MANDIANT First Response version 1.1.1 or later.
Network Security Threat Level:
Low / CVSS Base Score : 2.7
Networks Security ID: 21548
Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security
|IBM Netezza Database Accelerator Blade 00J1657 +Board 68Y8186 7870-AC1 2xQC 24GB
|IBM HS22 BLADECENTER SERVER TWO E5506 2.13GHZ 96GB 600GB 10K SAS
|IBM DX360 M3 SERVER TWO E5640 2.66GHZ 32GB 3 X 250GB SATA 2 X TESLA M1060 CONNEC
|IBM HS22 BLADECENTER SERVER TWO X5650 2.66GHZ 8GB 146GB 15K SAS
No Discussions have been posted on this vulnerability.