Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Checks version of First Response
Detailed Explanation for this Vulnerability Assessment
The remote Windows application is affected by multiple vulnerabilites.
The remote host contains a version of First Response, an incident
response tool, that is affected by multiple vulnerabilities.
If the First Response agent (fragent) is configured to listen for
remote SSL-enabled connections, it is reportedly possible to disable
the agent remotely by sending a series of specially-crafted requests,
thereby preventing legitimate connections from a First Response
Additionally, it is possible to hijack the agent by binding to the
same socket address on which it is already listening if it was bound
to the '0.0.0.0' wildcard address. A local attacker may be able to
leverage this flaw to deny service to the agent or to conduct a
man-in-the-middle attack against connecting clients.
See also :
Upgrade to MANDIANT First Response version 1.1.1 or later.
Network Security Threat Level:
Low / CVSS Base Score : 2.7
Networks Security ID: 21548
Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security
|Zotac Zbox Magnus mini pc:i5 6400+nvidia gtx 1070+1 TB HDD+128 GB SSD+Windows 10
|DELL POWEREDGE R610 SERVER L5630 2.13GHZ 24GB 3 X 1TB SATA PERC 6/I
No Discussions have been posted on this vulnerability.