October 24, 2008
On Thursday, Microsoft released a critical patch (MS08-067) for a remotely exploitable flaw in Windows. The Tenable research team released two plugins to check for this flaw:
- Plugin #34477, which does not require any credential, which remotely determines if a Windows 2000, XP or 2003 host is vulnerable to the overflow.
- Plugin #34476, which requires credentials, determines if the patch has properly been installed on the remote host by checking the version of the NetApi32.dll
Tenable transforms security technology for the business needs of tomorrow through comprehensive solutions that provide continuous visibility and critical context, enabling decisive actions to protect your organization. Tenable eliminates blind spots, prioritizes threats, and reduces exposure and loss. With more than one million users and more than 21,000 customers worldwide, organizations trust Tenable for proven security innovation. Tenable customers range from Fortune Global 500 companies, to the global public sector, to mid-sized enterprises in all sectors, including finance, government, healthcare, higher education, retail and energy. Transform security with Tenable, the creators of Nessus and leaders in continuous monitoring, by visiting tenable.com.
(410) 872-0555 x1559