October 24, 2008
On Thursday, Microsoft released a critical patch (MS08-067) for a remotely exploitable flaw in Windows. The Tenable research team released two plugins to check for this flaw:
- Plugin #34477, which does not require any credential, which remotely determines if a Windows 2000, XP or 2003 host is vulnerable to the overflow.
- Plugin #34476, which requires credentials, determines if the patch has properly been installed on the remote host by checking the version of the NetApi32.dll
Tenable™, Inc. is the Cyber Exposure company. Over 23,000 organizations of all sizes around the globe rely on Tenable to manage and measure their modern attack surface to accurately understand and reduce cyber risk. As the creator of Nessus®, Tenable built its platform from the ground up to deeply understand assets, networks and vulnerabilities, extending this knowledge and expertise into Tenable.io™ to deliver the world’s first platform to provide live visibility into any asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, large government agencies and mid-sized organizations across the private and public sectors. Learn more at tenable.com.