Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Microsoft Patch Tuesday Roundup - July 2011

Remote exploits come in many different shapes, forms and sizes. Listening services, web browsers and wireless technologies can all contain vulnerabilities that allow for "remote exploitation". The difficult part is defining just how "remote" an attacker needs to be. Obviously, the exposed network service could theoretically be exploited by anyone connected to the Internet. Web browser exploits require that a user visit a site (by choice or surreptitiously) that loads malicious code. Wireless technologies such as Bluetooth require that you be in range. Here's where it gets interesting! There are many situations where end users could be in range of attackers, including conferences, coffee shops, airports, or even right in your own facility. Having said that, it would be difficult for these attacks to target a specific organization unless you were physically on-site, which occurs less frequently than someone attacking you over the Internet. However, we should note that Bluetooth uses the 2.4 GHz spectrum for communications and can be extended using the same or similar gear as WiFi.

Boundary-image

(Click for larger image)

In honor of MS11-053, I dug out my Bluetooth wireless kit. Pictured above is a "cantenna" attached to an older long-range Class 1 Cisco-Linksys USBBT100 Bluetooth USB Adapter with an external antenna connector.

Nessus and SecurityCenter users can enumerate the Bluetooth devices in their environments using Nessus plugin ID 43830, "WMI Bluetooth Network Adapter Enumeration". Using credentials, this plugin will detect if a host has a Bluetooth adapter enabled.

Also of note, MS11-054 fixes 15 vulnerabilities in Windows kernel-mode drivers that lead to privilege escalation and a remote code execution in Microsoft's Visio application. The Visio vulnerability is interesting because network and systems engineers with a higher level of access to networks and systems use Visio as a documentation tool.

To further aid in your efforts to evaluate the exposures presented by the vulnerabilities addressed by Microsoft’s Patch Tuesday, Tenable's Research team has published Nessus plugins for each of the security bulletins issued this month:

  • MS11-053 - Nessus Plugin ID 55569 (Credentialed Check)
  • MS11-054 - Nessus Plugin ID 55570 (Credentialed Check)
  • MS11-055 - Nessus Plugin ID 55571 (Credentialed Check)
  • MS11-056 - Nessus Plugin ID 55572 (Credentialed Check)
  • Resources

    Related Posts

    Subscribe to the Tenable Blog

    Subscribe
    Try for Free Buy Now

    Try Tenable.io

    FREE FOR 60 DAYS

    Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

    Buy Tenable.io

    Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

    65 assets

    $2,190.00

    Buy Now

    Try for Free Buy Now

    Try Nessus Professional Free

    FREE FOR 7 DAYS

    Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

    Buy Nessus Professional

    Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

    Buy a multi-year license and save

    Try for Free Buy Now

    Try Tenable.io Web Application Scanning

    FREE FOR 60 DAYS

    Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

    Buy Tenable.io Web Application Scanning

    Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

    5 FQDNs

    $3,578.00

    Buy Now

    Try for Free Contact Sales

    Try Tenable.io Container Security

    FREE FOR 60 DAYS

    Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

    Buy Tenable.io Container Security

    Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

    Learn More about Industrial Security

    Get a Demo of Tenable.sc

    Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.