Tenable Network Security Podcast Episode 184 - "Video Killed the Network Security Star"
Note: Passive Vulnerability Scanner (PVS) is now Nessus Network Monitor. To learn more about this application and its latest capabilities, visit the Nessus Network Monitor web page.
Announcements
- We're hiring! - Visit the Tenable website for more information about open positions.
- Check out our video channel on YouTube which contains new Nessus, PVS, and SecurityCenter tutorials.
- Tenable Tweets - You can find us on Twitter at http://twitter.com/tenablesecurity where we make product and company announcements, provide Nessus plugin statistics, and more!
- Want to ask questions about Nessus, PVS, SecurityCenter, and LCE, and get answers from the experts at Tenable? Join the Tenable Discussion Forum for custom scripts, announcements, and more!
- You can subscribe to the Tenable Network Security Podcast on iTunes!
Discussion & Highlighted Plugins
- Passive Vulnerability Scanning Use Cases - You can use Tenable's Passive Vulnerability Scanner (PVS) to support many different efforts in your network security strategy. For example, as part of a vulnerability assessment, PVS solves many problems. There are many points where a network vulnerability scanner can plug in and start scanning, but sometimes it's tough to know where to start. With PVS, you can set it up ahead of time and review a list of collected vulnerabilities before the audit or assessment officially begins. Intrusion monitoring also can make use of passively collected vulnerabilities, using them to correlate to intrusion events and identify other systems with the same vulnerabilities used by attackers to gain access to your network. See Ron Gula's blog post "Adding Passive Vulnerability Scanning To Your Security ToolKit" for more information.
- "Patches Break Things!" - Believe me, I've been there. I was a Windows systems administrator, and then a UNIX/Linux systems administrator. I've applied my share of patches that have blown things up. Fast forward to today: We just can't afford to wait and test every patch, or have really long patch cycles for everything. We need multiple patch cycles. For example, when it comes to Adobe, you've got to be fast and furious with your patching. Adobe Reader should be an easy win – go ahead and push out those patches. Chances are that breaking Reader won't disrupt business operations (in some cases it may). Another strategy with merit is to patch users in groups. I had forgotten about this strategy, but nothing wrong with segmenting your users and constantly rolling out patches, watching for gotchas. Also, don't forget you can use Nessus for Auditing Adobe Reader JavaScript Settings, in addition to finding out if it's patched.
- Video Killed the Network Security Star - Two sets of plugins this week deal with video teleconferencing vulnerabilities from Cisco and Polycom. I've personally discovered and exploited similar vulnerabilities on enterprise networks. Attackers come in all different shapes and sizes. While most threats are malware based, you can't disregard the possibility of espionage or targeted attacks, which can be far reaching and damaging. For example, an attacker snooping in on conversations with your company. Groups of attackers are out there collecting information about your organization and selling it to other groups of attackers who use the information to exploit you. Don't give them an opportunity to snoop; patch and harden your video teleconferencing systems!
New & Notable Plugins
Nessus
General
- HTTP Cookie 'secure' Property Transport Mismatch
- MS13-072: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2845537)
- MS13-073: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2858300)
- MS13-073: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2858300) (Mac OS X)
- MS13-074: Vulnerabilities in Microsoft Access Could Allow Remote Code Execution (2848637)
- MS13-076: Vulnerabilities in Kernel-Mode Drivers Could Allow Elevation of Privilege (2876315)
- MS13-077: Vulnerability in Windows Service Control Manager Could Allow Elevation of Privilege (2872339)
- MS13-078: Vulnerability in FrontPage Could Allow Information Disclosure (2825621)
- MS13-079: Vulnerability in Active Directory Could Allow Denial of Service (2853587)
- MS KB2880289: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10
- Shockwave Player <= 12.0.3.133 Memory Corruption Vulnerabilities (APSB13-23)
- Adobe Acrobat < 11.0.4 / 10.1.8 Multiple Vulnerabilities (APSB13-22)
- Adobe Reader < 11.0.4 / 10.1.8 Multiple Vulnerabilities (APSB13-22)
- Adobe Reader < 11.0.4 / 10.1.8 Multiple Vulnerabilities (APSB13-22) (Mac OS X)
- LeagueManager Plugin for WordPress wp-admin/admin.php league_id Parameter SQL Injection
- Cisco Secure Access Control System (ACS) Multiple Vulnerabilities
- Cisco Video Surveillance Manager Web Detection
- Cisco Video Surveillance Manager Default Administrator Credentials
- Cisco Video Surveillance Manager Multiple Vulnerabilities (cisco-sa-20130724-vsm)
- AIX PowerHA Cluster Management Unspecified Remote Configuration Manipulation
- VxWorks 5.5 through 6.9 Multiple Vulnerabilities
- Adobe AIR <= 3.8.0.870 Memory Corruptions (APSB13-21)
- Flash Player <= 11.7.700.232 / 11.8.800.94 Memory Corruptions (APSB13-21)
- Adobe AIR for Mac <= 3.8.0.910 Memory Corruptions (APSB13-21)
- Flash Player for Mac <= 11.7.700.232 / 11.8.800.94 Memory Corruptions (APSB13-21)
- EMC NetWorker nsrpush Process Local Privilege Escalation
- HP SiteScope SOAP Call runOMAgentCommand SOAP Request Arbitrary Remote Code Execution
- Polycom SIP Detection
- Polycom HDX < 3.1.1.2 Multiple Vulnerabilities
- IBM WebSphere Service Registry and Repository Installed
- IBM WebSphere Service Registry and Repository 7.0 < 7.0.0 FP1 Authentication Bypass
- IBM Lotus Sametime Connect Client Installed
- IBM Lotus Sametime Connect Client Mouseover XSS
- Cisco IronPort PostX < 6.2.9.1 Multiple Vulnerabilities
- IBM DB2 Content Manager eClient Detection
- IBM DB2 Content Manager eClient < 8.4.1.1 Unspecified Security Vulnerability
- Cisco ASA Next-Generation Firewall Fragmented Traffic DoS (cisco-sa-20130626-ngfw)
- Cisco Unified MeetingPlace Detection
- Cisco Unified MeetingPlace Multiple Session Weaknesses
- Cisco TelePresence DSP Card Crafted RTP Packet H.264 Bit Stream Handling DoS
Passive Vulnerability Scanner
Vulnerability Detection
- Asterisk SIP Channel Driver ACK with SDP Denial of Service (AST-2013-004)
- Asterisk SIP Channel Driver Invalid SDP Denial of Service (AST-2013-005)
- Oracle GlassFish Server <= 3.1.1 Multiple Denial-of-Service Vulnerabilities
- Mac OS X 10.8 < 10.8.5 Multiple Vulnerabilities (Security Update 2013-004)
- Opera < 15.0 Cross-site Scripting Vulnerability
- Mozilla Thunderbird < 24.0 / ESR 17.0.9 Multiple Vulnerabilities
- Mozilla Firefox < 24.0 Multiple Vulnerabilities
- Mozilla SeaMonkey < 2.21 Multiple Vulnerabilities
- Apple iOS < 7 Multiple Vulnerabilities
SecurityCenter Apps
Security News Stories
- Tenable Network Security Executives Win Prestigious Ernst and Young Entrepreneur of the Year® 2013 Maryland Award
- Security Spending on the Rise as Threats Proliferate
- Look at risk before leaping into BYOD, report cautions
- Experts praise Pentagon's march to security standards
- Defending against web-based malware: Spot the smoke, don't wait for fire
- After Ten Years, Cracks In Microsoft's Patch Program
- iOS 7 patches 80 vulnerabilities
- Linus Torvalds Admits He's Been Asked to Insert Backdoor Into Linux
- Chaos Computer Club: iPhone 5S finger-sniffer COMPROMISED
- How I hacked SIM cards with a single text - and the networks DON'T CARE
- Flaw In iOS 7 Lets Attackers Take Control Of Users' iPhones
Related Articles
- Nessus Network Monitor
- Passive Network Monitoring
- Patch Auditing
- Podcast