Trustwave SpiderLabs Uncovers Unique Cybersecurity Risks in Today's Tech Landscape. Learn More

Trustwave SpiderLabs Uncovers Unique Cybersecurity Risks in Today's Tech Landscape. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats

TrustKeeper Scan Engine Update - September 14, 2012

Yes folks, it is time again for another update on the new developments in the TrustKeeper Scan Engine.

This update includes coverage for three new vulnerabilities for phpMyAdmin. These vulnerabilities are cross-site scripting vulnerabilities in a variety of components that are associated with database and table modification functions. All of these vulnerabilities are addressed as of the latest versions of phpMyAdmin (3.4.11.1 and 3.5.2.2), which were released on August 12, 2012. We recommend upgrading to the latest versions as soon as possible.

Additionally, the update includes coverage for two new vulnerabilities for MySQL. Both vulnerabilities are denial of service and require authenticated access to be exploited. However, if authenticated access is achieved, exploiting these vulnerabilities could result in denial of service conditions. All of these vulnerabilities are addressed as of MySQL (5.1.63 and 5.5.24), which were released last month.

As always, a number of new vulnerability checks and improvements to existing tests were implemented based on feedback from our customers.

New Vulnerability Test Highlights

Some of the more interesting vulnerability tests we added recently are as follows:

Apache
* Apache HTTP Server XSS in mod_negotiation Vulnerability (CVE-2012-2687)
* Apache HTTP Server Back End Connection Closing Response Mixup Vulnerability (CVE-2012-3502)

Cisco
* Cisco Clientless WebVPN crash after browser refreshes WebVPN portal page (CVE-2012-1344)
* Cisco IOS BGP Update Denial of Service Vulnerability (CVE-2012-1367)
* Cisco IOS Software no ipv6 address autoconfig May Cause Crash After Router Advertisement Flood Vulnerability (CSCti33534) (CVE-2010-4671)* Cisco IOS Software Crash During Webauth Test After Successful Login Vulnerability (CSCts88664) (CVE-2012-1338)
* Cisco IOS Software Crosstalk May be Heard by PSTN Callers During Call on Hold Vulnerability (CSCtx77750) (CVE-2012-1361)
* Cisco IOS Software Crash due to Corrupted magic value in in-use chunk when accessing irc (CSCso05336) (CVE-2009-5038)
* Cisco IOS Software Memory Leak on SIP UDP REGISTER Call Paths During Fuzzing Vulnerability (CSCtg41733) (CVE-2010-4683)
* Cisco IOS Software Wireless packets wedge radio interface input queue DoS (CSCtc12426)
(CVE-2012-1350)
* Cisco IOS Software Pub key cache for peers is not cleared after cert map change (CSCta79031)
(CVE-2010-4685)
* Cisco IOS Software CME crash after submitting SNR number change menu from EM phone
(CVE-2009-5040)

Microsoft
* Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution (MS12-054) (CVE-2012-1850, CVE-2012-1851, CVE-2012-1852, CVE-2012-1853)
* Vulnerability in Remote Desktop Could Allow Remote Code Execution (MS12-053) (CVE-2012-2526)
* Vulnerability in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (MS12-055)
(CVE-2012-2527)

MySQL
* MySQL Server Executable Comment Feature Remote Code Excecution Vulnerability (CVE-2009-5026)
* MySQL Incorrect Calculation and Sort Order Index Denial of Service (CVE-2012-2749)
* MySQL HANDLER READ NEXT after DELETE Denial of Service (CVE-2012-2102)

phpMyAdmin
* phpMyAdmin Multiple Cross-site Scripting Issues in Database Table Operations (CVE-2012-4345,
CVE-2012-4579)
* phpMyAdmin show_config_errors.php Path Disclosure Vulnerability (CVE-2012-4219)

PHP
* PHP HTTP Response Splitting Protection Bypass Vulnerability (CVE-2011-1398)

Smarty
* Smarty smarty_function_html_options_optoutput Cross-Site Scripting Vulnerability (CVE-2012-4277)

Splunk
* Splunk 4.3 and Earlier Cross-Site Scripting Vulnerability (CVE-2012-1908)

How to Update?

All Trustwave customers using the TrustKeeper Scan Engine receive the updates "auto-magically" as soon as an update is available. No action is required.

Latest Software Updates

Web Application Security – ModSecurity Commercial Rules, Update for February 2024

Overview for rules released by Trustwave SpiderLabs in February for ModSecurity Commercial Rules package. The rules are available for versions 2.9.x and 3.x of ModSecurity.

Read More

DbProtect 6.6.10 and AppDetectivePRO 10.9 Now Available

For any additional information, navigate to the Database Security folder in the File Cabinet of the Support section in the Trustwave Fusion platform.

Read More

Web Application Security – ModSecurity Commercial Rules, Update for January 2024

Overview for rules released by Trustwave SpiderLabs in January for ModSecurity Commercial Rules package. The rules are available for versions 2.9.x and 3.x of ModSecurity.

Read More