RELEASE DATE: | Wednesday May 15, 2013 |
MD5 CHECKSUM: | fb5466616b79247288501ff3b99f9393 |
SHA1 CHECKSUM: | ba3341020296781c3b545a04368e2f0862fe3b69 |
- Stonesoft Management Center: | 4.3.0.7891 |
- Stonesoft Firewall engine with inspection: | 4.3.0.6029 (if SIP or HTTP inspection is used) |
- Stonesoft IPS Sensor and Analyzer engine: | 4.3.0.4333 |
Risk level | Description | Reference | Vulnerability |
High | An attempt to exploit a vulnerability in Microsoft Visio detected | CVE-2013-1301 | Microsoft-Visio-External-Entities-Resolution-Vulnerability |
High | An attempt to exploit a vulnerability in Microsoft Visio detected | CVE-2013-1301 | Microsoft-Visio-External-Entities-Resolution-Vulnerability |
High | An attempt to exploit vulnerability in Microsoft Internet Explorer detected | CVE-2013-1347 | Microsoft-Internet-Explorer-CGenericElement-Memory-Corruption |
High | An attempt to exploit vulnerability in phpMyAdmin Devel Team phpMyAdmin detected | CVE-2013-3238 | Phpmyadmin-Preg_Replace-Function-Code-Injection |
High | An attempt to exploit vulnerability in McAfee Virtual Technician detected | CVE-2012-5879 | McAfee-Virtual-Technician-ActiveX-Control-Insecure-Method-Exposure |
Moderate | An attempt to exploit vulnerability in HP Intelligent Management Center detected | CVE-2012-5206 | HP-Intelligent-Management-Center-Syslogdownloadservlet-Information-Disclosure |
Moderate | An attempt to exploit vulnerability in MS Windows detected | CVE-2013-1305 | Windows-HTTP.sys-DOS-Vulnerability-CVE-2013-1305 |
Moderate | A vulnerabiity in Internet Explorer | CVE-2013-1279 | MSIE-JSON-Array-Information-Disclosure-Vulnerability |
Moderate | A vulnerabiity in Internet Explorer | CVE-2013-2551 | Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-2551 |
Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type |
Moderate | HP-Intelligent-Management-Center-Syslogdownloadservlet-Information-Disclosure | CVE-2012-5206 | HTTP_CSU-HP-IMC-Syslogdownloadservlet-Information-Disclosure | Suspected Compromise |
Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type |
Moderate | Windows-HTTP.sys-DOS-Vulnerability-CVE-2013-1305 | CVE-2013-1305 | HTTP_CSH-Windows-HTTP.sys-DOS-Vulnerability-CVE-2013-1305 | Suspected Compromise |
Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type |
High | Phpmyadmin-Preg_Replace-Function-Code-Injection | CVE-2013-3238 | HTTP_CRL-Phpmyadmin-Preg_Replace-Function-Code-Injection | Suspected Compromise |
Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type |
High | Microsoft-Internet-Explorer-CGenericElement-Memory-Corruption | CVE-2013-1347 | File-Text_Microsoft-Internet-Explorer-CGenericElement-Memory-Corruption | Suspected Compromise |
Moderate | MSIE-JSON-Array-Information-Disclosure-Vulnerability | CVE-2013-1279 | File-Text_MSIE-JSON-Array-Information-Disclosure-Vulnerability | Potential Compromise |
Moderate | Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-2551 | CVE-2013-2551 | File-Text_Internet-Explorer-Use-After-Free-CVE-2013-2551 | Potential Compromise |
High | McAfee-Virtual-Technician-ActiveX-Control-Insecure-Method-Exposure | CVE-2012-5879 | File-Text_McAfee-Virtual-Technician-ActiveX-Control-Insecure-Method-Exposure | Suspected Compromise |
Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type |
High | Microsoft-Visio-External-Entities-Resolution-Vulnerability | CVE-2013-1301 | File-TextId_Microsoft-Visio-External-Entities-Resolution-Vulnerability-2 | Suspected Compromise |
High | Microsoft-Visio-External-Entities-Resolution-Vulnerability | CVE-2013-1301 | File-TextId_Microsoft-Visio-External-Entities-Resolution-Vulnerability | Potential Compromise |
Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type | Change Description | |
Moderate | HTTP-Facebook-Photo-Uploader-ActiveX-Control-FileMask-Method-BOF | CVE-2008-0660 | HTTP_SS-Facebook-Photo-Uploader-ActiveX-Control-FileMask-Method-BOF | Compromise |
|
Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type | Change Description | |
Moderate | 3s-Smart-Software-Solutions-Codesys-Gateway-Server-Denial-Of-Service | CVE-2012-4707 | Generic_CS-Smart-Software-Solutions-Codesys-Gateway-Server-Denial-Of-Service | Suspected Compromise |
|
|
Moderate | 3s-Smart-Software-Solutions-Codesys-Gateway-Server-Memory-Access-Error | CVE-2012-4704 | Generic_CS-Smart-Software-Solutions-Codesys-Gateway-Server-Memory-Access-Error | Suspected Compromise |
|
Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type | Change Description | |
Low | MS-Ie-Frame-Iframe-Embed-Tag-Attribute-BOF-MS04-040 | CVE-2004-1050 | Generic_SS-Internet-Explorer-HTML-Elements-Buffer-Overflow | Suspected Compromise |
|
Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type | Change Description | |||
Moderate | HP-Intelligent-Management-Center-Ictdownloadservlet-Information-Disclosure | CVE-2012-5204 | HTTP_CSU-HP-IMC-Ictdownloadservlet-Information-Disclosure | Suspected Compromise |
|
|||
Moderate | HP-Intelligent-Management-Center-Downloadservlet-Information-Disclosure | CVE-2012-5208 | HTTP_CSU-HP-Intelligent-Management-Center-Downloadservlet-Information-Disclosure | Suspected Compromise |
|
|||
High | HTTP-DFind-Scanner | No CVE/CAN | HTTP_DFind-Scanner-Usage | Suspected Probe |
|
Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type | Change Description | ||
Moderate | HTTP-Facebook-Photo-Uploader-ActiveX-Control-FileMask-Method-BOF | CVE-2008-0660 | File-Text_Facebook-Photo-Uploader-ActiveX-Control-FileMask-Method-BOF | Compromise |
|
Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type | Change Description | ||
High | Microsoft-Office-TIFF-Converter-Heap-Overflow-CVE-2010-3947 | CVE-2010-3947 | File-Binary_Microsoft-Office-TIFF-Converter-Heap-Overflow-CVE-2010-3947 | Potential Compromise |
|
Type | Name |
Category | Microsoft Visio 2010 |
Category | Microsoft Visio 2007 |
Category | MS2013-05 |
Situation | Generic_CS-FTP-Traffic-Over-Non-Standard-Port |
Application | Soundcloud |
Application | |
Application | Apple-PhotoStream |
Application | Mojang-Minecraft-Java |
Application |
Type | Name | Changes | ||||
Situation | HTTP_CCH-Apache-And-Nginx-Chunked-Encoding-Buffer-Overflow |
|
||||
Situation | HTTP_Morfeus-Scanner-Usage |
|
||||
Application | Baidu-Hi-Game |
|
||||
Application | Baidu-Hi-Audio-Video |
|
||||
Application | IMAPS |
|
||||
Application | NFS |
|
||||
Application | Baidu-Hi-File-Transfer |
|
||||
Application | BigAnt-Office-Messenger |
|
||||
Application | Ammyy-Admin |
|
||||
Application | AOL-Proxy |
|
||||
Application | Rsync |
|
||||
Application | MySQL |
|
||||
Application | IRC |
|
||||
Application | Subversion-SVN |
|
||||
Application | Citrix-XML-Service |
|
||||
Application | FTP |
|
||||
Application | Microsoft-SQL-Server |
|
||||
Application | Jabber |
|
||||
Application | IBM-solidDB |
|
||||
Application | SMB |
|
||||
Application | AliWW-Remote-Control |
|
||||
Application | IPP |
|
||||
Application | Blizzard-World-of-Warcraft |
|
||||
Application | CVS |
|
||||
Application | AliWW-File-Transfer |
|
||||
Application | X11 |
|
||||
Application | VNC-Remote-Framebuffer-Protocol |
|
||||
Application | ICAP |
|
||||
Application | POP3 |
|
||||
Application | SMTP |
|
||||
Application | Telnet |
|
||||
Application | Citrix-ICA |
|
||||
Application | NetWare-Core-Protocol |
|
||||
Application | Dameware-Mini-Remote-Control |
|
||||
Application | Apple-Filing-Protocol |
|
||||
Application | mDNS |
|
||||
Application | TLS |
|
||||
Application | IMAP |
|
||||
Application | ARCserve |
|
||||
Application | IDENT |
|
||||
Application | MSRPC |
|
||||
Application | Oracle |
|
||||
Application | IP-Messenger |
|
||||
Application | Citrix-Provisioning-Services |
|
||||
Application | NNTP |
|
||||
Application | SSH |
|
||||
Application | Amazon-CloudFront |
|
||||
Application | Apple-iCloud |
|
||||
Application | Amazon-Simple-Storage-Service |
|
||||
Application | Microsoft-Office-Live-Workspace |
|
||||
VPN Profile | Suite-B-GCM-256 |
1. | Ensure that the MD5 and SHA1 checksums of the update package are correct. |
2. | Open Admin Tools in the SMC GUI client. |
3. | Right-click on the Updates folder and select "Import Update Packages". |
4. | Right-click on the imported package and select Activate. |
5. | Reinstall the system policy to take the changes into use. Custom policies may require manual updating. |
Stonesoft provides these materials for informational purposes only. They are subject to change without notice and do not represent a commitment on the part of Stonesoft. Stonesoft assumes no liability for any errors or inaccuracies that may appear in these materials or for incompatibility between different hardware components, required BIOS settings, NIC drivers, or any NIC configuration issues. Use these materials at your own risk. Stonesoft does not warrant or endorse any third party products described herein.
THESE MATERIALS ARE PROVIDED "AS-IS." STONESOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, AS TO, THE INFORMATION CONTAINED HEREIN. IN ADDITION, STONESOFT MAKES NO EXPRESS OR IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE OR USE WITH RESPECT THE INFORMATION CONTAINED IN THESE MATERIALS.
IN NO EVENT SHALL STONESOFT BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL OR INCIDENTAL DAMAGES, INCLUDING, BUT NOT LIMITED TO, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING FROM THE USE OF THESE MATERIALS, EVEN IF ADVISED IN ADVANCE OF THE POSSIBILITY OF SUCH DAMAGES.