Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

August 8th, 2006 Microsoft Tuesday Nessus Checks

Nessuslogo_11 Tenable Direct Feed and Security Center users have updated Nessus plugins to check for all vulnerabilities disclosed by the recent "Microsoft Tuesday" patches. The majority of these checks are for client-side issues and require local access with domain credentials. There were 12 local checks in total including two for Microsoft Office.

There is one highly critical remote flaw (MS06-040) which is a stack overflow. It is possible to exploit Windows 2000 and XP SP1 remotely if they are not protected by a firewall. Windows 2003 SP1 and XP SP2 may also be exploitable, but could just be subject to a denial of service attack. Tenable has developed Nessus plugin 22194 which can check for MS06-040 remotely without any credentials at all.

Tenable is also actively analyzing these patches for detection with the Passive Vulnerability Scanner.

Related Articles

Cybersecurity News You Can Use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.