Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Checks version of First Response
Detailed Explanation for this Vulnerability Assessment
The remote Windows application is affected by multiple vulnerabilites.
The remote host contains a version of First Response, an incident
response tool, that is affected by multiple vulnerabilities.
If the First Response agent (fragent) is configured to listen for
remote SSL-enabled connections, it is reportedly possible to disable
the agent remotely by sending a series of specially-crafted requests,
thereby preventing legitimate connections from a First Response
Additionally, it is possible to hijack the agent by binding to the
same socket address on which it is already listening if it was bound
to the '0.0.0.0' wildcard address. A local attacker may be able to
leverage this flaw to deny service to the agent or to conduct a
man-in-the-middle attack against connecting clients.
See also :
Upgrade to MANDIANT First Response version 1.1.1 or later.
Network Security Threat Level:
Low / CVSS Base Score : 2.7
Networks Security ID: 21548
Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security
|Toshiba 64 GB 64GB USB Flash Drive TransMemory Thumb Pen Drive Storage Memory
|Iowa State Cyclones Flash Tag USB Drive 8GB
|University of South Florida Bulls Flash Key USB Drive 4GB
|SanDisk Cruzer Glide 32GB USB Flash Drive *NEW* Still in ORIG Packaging
No Discussions have been posted on this vulnerability.