TrustKeeper Scan Engine Update for September 02, 2015

The latest update to the TrustKeeper scan engine that powers our Trustwave Vulnerability Management product (including both internal and external vulnerability scanning) is now available.

This week we bring you 21 new vulnerability checks affecting Apache HTTP Server, Apache Tomcat, PostgreSQL and phpMyAdmin to name a few.

Enjoy!

New Vulnerability Test Highlights

Some of the more interesting vulnerability tests we added recently are as follows:

Apache

  • Apache HTTP Server Denial of Service Vulnerability via Include Filter (CVE-2015-0253)
  • Apache HTTP Server Bypass Access Restriction Vulnerability via Require Directive (CVE-2015-3185)
  • Apache HTTP Server Request Smuggling Vulnerability via Invalid Chunk-Extension Characters (CVE-2015-3183)
  • Apache Tomcat Denial of Service Vulnerability via Request Body (CVE-2014-0230)
  • Apache Tomcat Security Manager Bypass Vulnerability (CVE-2014-7810)

PostgreSQL

  • PostgreSQL "double free" during authentication causes daemon crash (CVE-2015-3165)
  • PostgreSQL denial-of-service via SELECT with many LEFT JOINs (CVE-2010-0733)

phpMyAdmin

  • phpMyAdmin Cross-site Scripting Vulnerability in setup (CVE-2015-3902)
  • phpMyAdmin Cross-site Scripting Vulnerability in View Operation Page (CVE-2014-5274)
  • phpMyAdmin Man in the Middle Vulnerability via Github API (CVE-2015-3903)

ISC

  • ISC BIND Denial of Service Vulnerability via TKEY Queries (CVE-2015-5477)

Oracle

Ruby on Rails

  • Ruby on Rails Cross-site Scripting Vulnerability via JSON encoding (CVE-2015-3226)
  • Ruby on Rails Denial of Service Vulnerability via jdom (CVE-2015-3227)

WordPress

  • WordPress Bypass Vulnerability via edit_posts (CVE-2015-5623)
  • WordPress Cross-site Scripting Vulnerability via shortcodes (CVE-2015-5622)
  • WordPress Cross-site Scripting Vulnerability via wp-db.php (CVE-2015-3440)

How to Update?

All Trustwave customers using the TrustKeeper Scan Engine receive the updates automatically as soon as an update is available. No action is required.

Trustwave reserves the right to review all comments in the discussion below. Please note that for security and other reasons, we may not approve comments containing links.