BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Apache 2.4.x XSS and Back-end Connection Vulnerabilities News

Posted August 28, 2012    Peter McCalister

Two new audits have been released recently in our Retina vulnerability scan engine to close a security vulnerability that can enable an attacker to upload files remotely via a XSS flaw or lead to privacy issues because of a back end connection closing issue (CVE-2012-2687 and CVE-2012-3502, respectively). These two new audits have been released with the commercial version of Retina Network. Users can include these new checks in a general vulnerability scan, or can create a targeted scan to specifically look for these specific vulnerabilities using the following Retina audits:

  • Audit ID 16927 Apache 2.4 Multiple Vulnerabilities (20120821) – Banner
  • Audit ID 16928 Apache 2.4 Multiple Vulnerabilities (20120821) – Package

If you have concerns of the security posture of your Apache environment feel free to contact our sales team and try out our Retina Network Security Scanner to discover, assess and gain remediation guidance in our simple to use standalone scanner. In addition to standard assessment of patches, insecure configurations and zero-days our Retina Web Security Scanner also provides in-depth credentialed web application scanning to identify application vulnerabilities as well as site exposure risk, ranks threat priority, produces highly graphical, intuitive HTML reports, and indicates site security posture by vulnerabilities and threat level.. http://www.eeye.com/products/retina/web-security-scanner.

I should also mention that we have a new version of our Retina Network scanner planned for later this month that includes a complete user interface overhaul and allows users to select from a list of built-in profiles to align the product to your specific job function.

Leave a Reply

Additional articles

PBPS-screenshot-blog aug2014

Failing the Security Basics: Backoff Point-of-Sale Malware

Posted August 22, 2014    Marc Maiffret

At the beginning of this month, US-CERT issued a security alert relating to a string of breaches that had been targeting Point of Sale (POS) systems. The alert details that attackers were leveraging brute forcing tools to target common remote desktop applications such as Microsoft’s Remote Desktop, Apple Remote Desktop, Splashtop and LogMeIn among others….

Tags:
, , , , , ,

Troubleshooting Windows Privilege Management Rules with Policy Monitor

Posted August 21, 2014    Jason Silva

When defining and testing PowerBroker for Windows rules for production or pilots, customers sometimes tell us, “I don’t think this policy / program is working.” This is usually a case of the policy not properly triggering because of the way the rule was created. A unique feature of PowerBroker for Windows compared to other solutions is a client-side…

Tags:
, , ,
darren-mar-elia

BeyondTrust Webcast: Darren Mar-Elia’s 4 Active Directory Change Scenarios to Track

Posted August 20, 2014    Chris Burd

In our latest webcast, we joined Darren Mar-Elia, CTO at SDM Software, to discuss best practices for Active Directory (AD) change management. Here are some key takeaways from the presentation, followed by a link to a full-length video of the presentation. Mar-Elia kicks things off with a critical insight: that the best AD change management…

Tags:
, , , , , , ,