| RELEASE DATE: | Wednesday December 23, 2015 |
| MD5 CHECKSUM: | 8ba4030056977daf94ab61d06560a2da |
| SHA1 CHECKSUM: | 37b69519a1dc4eb8db7bd5d6b23599a33b2dcb14 |
| - Stonesoft Management Center: | 5.2.0.8231 |
| - Stonesoft Firewall engine with inspection: | 5.2.0.8034 (if SIP or HTTP inspection is used) |
| - Stonesoft IPS Sensor and Analyzer engine: | 5.2.0.5211 |
| Risk level | Description | Reference | Vulnerability |
| Critical | An attempt to exploit a vulnerability in Schneider Electric Modicon M340 detected | CVE-2015-7937 | Schneider-Electric-Modicon-M340-Buffer-Overflow-Vulnerability |
| Critical | An attempt to exploit a vulnerability in Zen Cart detected | CVE-2015-8352 | Zen-Cart-Ajax.php-Remote-Code-Execution |
| High | An attempt to exploit a Tivoli Endpoint Buffer Overflow vulnerability detected. | CVE-2011-1220 | Tivoli-Endpoint-Buffer-Overflow |
| High | An attempt to exploit a Novell File Reporter Arbitrary File Delete vulnerability detected. | CVE-2011-2750 | Novell-File-Reporter-Arbitrary-File-Delete |
| High | An attempt to exploit a Lifesize Room Command Execution vulnerability detected. | CVE-2011-2763 | Lifesize-Room-Command-Execution |
| High | An attempt to exploit an EMC Replication Manager Command Execution vulnerability detected. | CVE-2011-0647 | EMC-Replication-Manager-Command-Execution |
| High | An attempt to exploit a vulnerability in Microsoft Windows detected | CVE-2015-6128 | Microsoft-Windows-Els.dll-Insecure-Library-Loading |
| High | An attempt to exploit a vulnerability in Unitronics VisiLogic OPLC detected | CVE-2015-7905 | Unitronics-Unidownloader-And-VisiLogic-OPLC-Ipworksssl-Memory-Corruption |
| High | An attempt to exploit a vulnerability in Microsoft Windows detected | CVE-2015-6128 | Microsoft-Windows-Els.dll-Insecure-Library-Loading |
| High | An attempt to exploit a vulnerability in Microsoft Office detected | CVE-2015-1770 | Microsoft-Office-Uninitialized-Memory-Use-Vulnerability-CVE-2015-1770 |
| High | An attempt to exploit a vulnerability in Microsoft Windows detected | CVE-2015-6128 | Microsoft-Windows-Els.dll-Insecure-Library-Loading |
| High | An attempt to exploit a vulnerability in Adobe Systems AIR desktop runtime detected | CVE-2015-3105 | Adobe-Flash-Player-Shader-Parameter-Write-What-Where |
| Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type |
| High | Tivoli-Endpoint-Buffer-Overflow | CVE-2011-1220 | HTTP_CS-Tivoli-Endpoint-Buffer-Overflow | Suspected Compromise |
| Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type |
| High | EMC-Replication-Manager-Command-Execution | CVE-2011-0647 | Generic_CS-EMC-Replication-Manager-Command-Execution | Suspected Compromise |
| Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type |
| Critical | Schneider-Electric-Modicon-M340-Buffer-Overflow-Vulnerability | CVE-2015-7937 | HTTP_CSH-Schneider-Electric-Modicon-M340-Buffer-Overflow-Vulnerability | Suspected Compromise |
| Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type |
| High | Novell-File-Reporter-Arbitrary-File-Delete | CVE-2011-2750 | HTTP_CRL-Novell-File-Reporter-Arbitrary-File-Delete | Suspected Compromise |
| High | Lifesize-Room-Command-Execution | CVE-2011-2763 | HTTP_CRL-Lifesize-Room-Command-Execution | Suspected Compromise |
| Critical | Zen-Cart-Ajax.php-Remote-Code-Execution | CVE-2015-8352 | HTTP_CRL-Zen-Cart-Ajax.php-Remote-Code-Execution | Suspected Compromise |
| Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type |
| High | Unitronics-Unidownloader-And-VisiLogic-OPLC-Ipworksssl-Memory-Corruption | CVE-2015-7905 | File-Text_Unitronics-Unidownloader-And-VisiLogic-OPCL-Ipworksssl-Memory-Corruption | Suspected Compromise |
| Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type |
| High | Microsoft-Windows-Els.dll-Insecure-Library-Loading | CVE-2015-6128 | File-OLE_Microsoft-Windows-Els.dll-Insecure-Library-Loading | Suspected Compromise |
| Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type |
| High | Adobe-Flash-Player-Shader-Parameter-Write-What-Where | CVE-2015-3105 | File-Flash_Adobe-Flash-Player-Shader-Parameter-Write-What-Where-3 | Suspected Compromise |
| Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type |
| High | Microsoft-Windows-Els.dll-Insecure-Library-Loading | CVE-2015-6128 | File-RTF_Microsoft-Windows-Els.dll-Insecure-Library-Loading | Suspected Compromise |
| High | Microsoft-Office-Uninitialized-Memory-Use-Vulnerability-CVE-2015-1770 | CVE-2015-1770 | File-RTF_Microsoft-Office-Uninitialized-Memory-Use-Vulnerability-CVE-2015-1770 | Suspected Compromise |
| Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type |
| High | Microsoft-Windows-Els.dll-Insecure-Library-Loading | CVE-2015-6128 | File-TextId_Microsoft-Windows-Els.dll-Insecure-Library-Loading | Suspected Compromise |
| Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type | Change Description | |||
| High | Hylafaxplus-LDAP-Authentication-User-Name-Buffer-Overflow | CVE-2013-5680 | Generic_CS-Hylafaxplus-LDAP-Authentication-User-Name-Buffer-Overflow | Potential Compromise |
|
| Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type | Change Description | |||
| Critical | PHP-Cgi-Remote-Code-Execution | CVE-2012-1823 | HTTP_CSU_PHP-Cgi-Remote-Code-Execution | Compromise |
|
|||
| High | Indusoft-Web-Studio-Remote-File-Access | CVE-2011-1900 | HTTP_CSU-System-File-Disclosure | Disclosure |
|
|||
| High | Sybase-EAServer-Directory-Traversal | CVE-2011-2474 | HTTP_CSU-Apache-Backslash-Directory-Traversal | Suspected Compromise |
|
| Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type | Change Description | |
| High | Squid-ASN.1-Header-Parsing-Denial-Of-Service | CVE-2004-0918 | SNMP-UDP_Squid-ASN.1-Header-Parsing-Denial-Of-Service | Suspected Compromise |
|
| Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type | Change Description | |
| Low | Generic-Shared-Variables | No CVE/CAN | File-Text_Shared-Variables | System Inspections |
|
|
| Low | HTTP-Mozilla-CSS-Moz-Binding-Cross-Site-Scripting | CVE-2006-0496 | File-Text_Mozilla-CSS-Moz-Binding-Cross-Site-Scripting | Potential Disclosure |
|
|
| High | Adobe-Acropdf-ActiveX-Control-Memory-Corruption | CVE-2006-6027 | File-Text_Adobe-Acropdf-ActiveX-Control-Memory-Corruption | Suspected Compromise |
|
|
| High | Microsoft-Internet-Explorer-BrowseDialog-ActiveX-Control-Denial-of-Service | CVE-2007-0371 | File-Text_Microsoft-Internet-Explorer-BrowseDialog-ActiveX-Control-Denial-of-Service | Suspected Compromise |
|
|
| High | Mozilla-Firefox-CVE-2014-1510-Webidl-Implementation-Privilege-Escalation | CVE-2014-1510 | File-Text_Mozilla-Firefox-CVE-2014-1510-Webidl-Implementation-Privilege-Escalation | Suspected Compromise |
|
|
| High | Oracle-Data-Quality-Filechooserdlg-Onchangedirectory-Untrusted-Pointer-Deref | CVE-2014-2418 | File-Text_Oracle-Data-Quality-Filechooserdlg-Onchangedirectory-Untrusted-Pointer-Dereference | Suspected Compromise |
|
| Type | Name |
| Category | Zen Cart |
| Category | Unitronics UniDownloader |
| Category | Schneider Electric Modicon M340 |
| Category | LifeSize Room |
| Category | EMC Replication Manager |
| Application | Moxtra-Meeting |
| Type | Name | Changes | |||||||||
| Network Element | TOR exit nodes | ||||||||||
| Situation | File-Text_Adobe-Reader-ActiveX-Vulnerable-Function-Call |
|
| 1. | Ensure that the MD5 and SHA1 checksums of the update package are correct. |
| 2. | Open Admin Tools in the SMC GUI client. |
| 3. | Right-click on the Updates folder and select "Import Update Packages". |
| 4. | Right-click on the imported package and select Activate. |
| 5. | Reinstall the system policy to take the changes into use. Custom policies may require manual updating. |