October 24, 2008
On Thursday, Microsoft released a critical patch (MS08-067) for a remotely exploitable flaw in Windows. The Tenable research team released two plugins to check for this flaw:
- Plugin #34477, which does not require any credential, which remotely determines if a Windows 2000, XP or 2003 host is vulnerable to the overflow.
- Plugin #34476, which requires credentials, determines if the patch has properly been installed on the remote host by checking the version of the NetApi32.dll
Tenable®, Inc. is the Cyber Exposure company. Over 24,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver Tenable.io®, the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include 53 percent of the Fortune 500, 29 percent of the Global 2000 and large government agencies. Learn more at tenable.com.