Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Checks version of First Response
Detailed Explanation for this Vulnerability Assessment
The remote Windows application is affected by multiple vulnerabilites.
The remote host contains a version of First Response, an incident
response tool, that is affected by multiple vulnerabilities.
If the First Response agent (fragent) is configured to listen for
remote SSL-enabled connections, it is reportedly possible to disable
the agent remotely by sending a series of specially-crafted requests,
thereby preventing legitimate connections from a First Response
Additionally, it is possible to hijack the agent by binding to the
same socket address on which it is already listening if it was bound
to the '0.0.0.0' wildcard address. A local attacker may be able to
leverage this flaw to deny service to the agent or to conduct a
man-in-the-middle attack against connecting clients.
See also :
Upgrade to MANDIANT First Response version 1.1.1 or later.
Network Security Threat Level:
Low / CVSS Base Score : 2.7
Networks Security ID: 21548
Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security
|Dell PowerEdge R710 2x X5670 2.93GHz 6 Core 96GB 6x 1TB 7.2K SATA PERC 6/i
|Intel Xeon E5-2428L 1.8GHz (2.0GHz Turbo) 15MB 7.2GT/s SR0M3 CPU Processor
|Dell PowerEdge R720 2x E5-2620 2.0GHz 6 Core 48GB 8x 3TB 7.2K SAS H710
|Dell PowerEdge R710 2x X5570 2.93GHz Quad Core 48GB 6x 600GB 15K SAS PERC 6/i
No Discussions have been posted on this vulnerability.