Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Checks version of First Response
Detailed Explanation for this Vulnerability Assessment
The remote Windows application is affected by multiple vulnerabilites.
The remote host contains a version of First Response, an incident
response tool, that is affected by multiple vulnerabilities.
If the First Response agent (fragent) is configured to listen for
remote SSL-enabled connections, it is reportedly possible to disable
the agent remotely by sending a series of specially-crafted requests,
thereby preventing legitimate connections from a First Response
Additionally, it is possible to hijack the agent by binding to the
same socket address on which it is already listening if it was bound
to the '0.0.0.0' wildcard address. A local attacker may be able to
leverage this flaw to deny service to the agent or to conduct a
man-in-the-middle attack against connecting clients.
See also :
Upgrade to MANDIANT First Response version 1.1.1 or later.
Network Security Threat Level:
Low / CVSS Base Score : 2.7
Networks Security ID: 21548
Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security
|WatchGuard XTM 2 Series Firewall HW Model #FS1E5W
|Meraki mx65 cloud managed firewall router (2) WAN Ports (10) LAN ports
|SonicWall NSA 220 Unlimited Node APL24-08E Network Security Appliance
|WatchGuard Firebox T15-W Network Security/Firewall Appliance
No Discussions have been posted on this vulnerability.