TrustKeeper Scan Engine Update

A new update to the TrustKeeper scan engine is being released, with several new vulnerability detections and numerous internal improvements. The new vulnerabilities detected include several that were fixed in the latest release of Wordpress, 3.3.2, including three cross-site scripting (XSS) vulnerabilities and a cross-site request forgery (CSRF) one.

This update also includes new vulnerability checks for the recent Microsoft Windows vulnerabilities covered by MS12-041 and MS12-042 and the recent Oracle "TNS Poison" vulnerability, which could potentially allow a remote attacker to cause Oracle Database clients to connect to a malicious server instead of the intended server.

Additionally, and as is often the case, this update includes improvements to evidence and other information that is reported when vulnerabilities are detected, in response to customer feedback.

New Vulnerability Test Highlights

Some of the more interesting vulnerability tests we added recently are as follows:

Microsoft
* Microsoft Windows String Atom Class Name Handling Vulnerability (1) (MS12-041) (CVE-2012-1864)
* Microsoft Windows String Atom Class Name Handling Vulnerability (2) (MS12-041) (CVE-2012-1865)
* Microsoft Windows Clipboard Format Atom Name Handling Vulnerability (MS12-041) (CVE-2012-1866)
* Microsoft Windows Font Resource Refcount Integer Overflow Vulnerability (MS12-041) (CVE-2012-1867)
* Microsoft Windows Win32k.sys Race Condition Vulnerability (MS12-041) (CVE-2012-1868)
* Microsoft Windows User Mode Scheduler Memory Corruption Vulnerability (MS12-042) (CVE-2012-0217)

Oracle
* Oracle TNS Listener Poisoning Vulnerability (CVE-2012-1675)

PHP
* PHP Buffer Overflow Vulnerability in libmysql.c (CVE-2006-0097)

Wordpress
* Multiple Wordpress XSS Vulnerabilities via Offsite Redirects (CVE-2012-2404)

How to Update?

All Trustwave customers using the TrustKeeper Scan Engine receive the updates "auto-magically" as soon as an update is available. No action is required.

Trustwave reserves the right to review all comments in the discussion below. Please note that for security and other reasons, we may not approve comments containing links.