Microsoft security alert.
October 10, 2006
Advisory overview
Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 26 vulnerabilities that were fixed in 10 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Vulnerability details
Microsoft has released 10 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
-
Microsoft ASP.NET 2.0 Information Disclosure Vulnerability (MS06-056)
- Severity
- Medium 2
- Qualys ID
- 90357
- Vendor Reference
- MS06-056
- CVE Reference
- CVE-2006-3436
- CVSS Scores
- Base 4.3 / Temporal 3.2
- Description
- ASP.NET is a collection of technologies within the .NET Framework that allows developers to build Web applications and XML Web services. ASP.NET 2.0 is vulnerable to an information disclosure vulnerability because it could inject a client side script in the user's browser.
- Consequence
- An attacker could gain unauthorized access to information. This vulnerability would not allow an attacker to execute code but it could be used to acquire information that could be used to further compromise the affected system.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Microsoft Windows 2000 Service Pack 4 (Microsoft .NET Framework 2.0 ):
http://www.microsoft.com/downloads/details.aspx?FamilyId=34C375AA-2F54-4416-B1FC-B73378492AA6Microsoft Windows XP Service Pack 1 or Windows XP Service Pack 2 (Microsoft .NET Framework 2.0 ):
http://www.microsoft.com/downloads/details.aspx?FamilyId=34C375AA-2F54-4416-B1FC-B73378492AA6Microsoft Windows XP Professional x64 Edition (Microsoft .NET Framework 2.0 ):
http://www.microsoft.com/downloads/details.aspx?FamilyId=34C375AA-2F54-4416-B1FC-B73378492AA6Microsoft Windows XP Tablet PC Edition (Microsoft .NET Framework 2.0 ):
http://www.microsoft.com/downloads/details.aspx?FamilyId=34C375AA-2F54-4416-B1FC-B73378492AA6Microsoft Windows XP Media Center Edition (Microsoft .NET Framework 2.0 ):
http://www.microsoft.com/downloads/details.aspx?FamilyId=34C375AA-2F54-4416-B1FC-B73378492AA6Microsoft Windows Server 2003 or Microsoft Windows Server 2003 Service Pack 1 (Microsoft .NET Framework 2.0 ):
http://www.microsoft.com/downloads/details.aspx?FamilyId=34C375AA-2F54-4416-B1FC-B73378492AA6Windows Server 2003 with Service Pack 1 for Itanium-based Systems (Microsoft .NET Framework 2.0 ):
http://www.microsoft.com/downloads/details.aspx?FamilyId=34C375AA-2F54-4416-B1FC-B73378492AA6Microsoft Windows Server 2003 x64 Edition (Microsoft .NET Framework 2.0 ):
http://www.microsoft.com/downloads/details.aspx?FamilyId=34C375AA-2F54-4416-B1FC-B73378492AA6Refer to Microsoft Security Bulletin MS06-056 for further details.
-
Microsoft Windows Explorer Remote Code Execution Vulnerability (MS06-057)
- Severity
- Urgent 5
- Qualys ID
- 90352
- Vendor Reference
- ms06-057
- CVE Reference
- CVE-2006-3730
- CVSS Scores
- Base 9.3 / Temporal 8.1
- Description
- A vulnerability exists in Windows that is caused due to an error in the Windows Shell. The issue is exposed via the "setSlice()" method in the WebViewFolderIcon ActiveX control (webvw.dll). For example, this vulnerability could be exploited via Internet Explorer by a malicious Web site to corrupt memory by passing specially-crafted arguments to the "setSlice()" method.
- Consequence
- Successful exploitation of this vulnerability allows the execution of arbitrary code.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Microsoft Windows 2000 Service Pack 4 :
http://www.microsoft.com/downloads/details.aspx?FamilyId=756f53a7-28dc-422a-a691-c1bbfcbf3d0cMicrosoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2 :
http://www.microsoft.com/downloads/details.aspx?FamilyId=235bca55-8d43-4eaf-8970-a55bc3165e3dMicrosoft Windows XP Professional x64 Edition :
http://www.microsoft.com/downloads/details.aspx?FamilyId=96271f96-0d8e-4ab1-b131-2b37fca7e6e7Microsoft Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1 :
http://www.microsoft.com/downloads/details.aspx?FamilyId=48f2314b-b268-468c-919c-593e06af4453Microsoft Windows Server 2003 for Itanium based Systems and Microsoft Windows Server 2003 with SP1 for Itanium based Systems :
http://www.microsoft.com/downloads/details.aspx?FamilyId=6507e201-b84e-432a-8797-23b586ad15aeMicrosoft Windows Server 2003 x64 Edition :
http://www.microsoft.com/downloads/details.aspx?FamilyId=2b39693f-aabc-49c6-9d1a-6791f80f8f22Refer to Microsoft Security Bulletin MS06-057 for further details.
-
Microsoft PowerPoint Multiple Remote Code Execution Vulnerabilities (MS06-058)
- Severity
- Urgent 5
- Qualys ID
- 110043
- Vendor Reference
- MS06-058
- CVE Reference
- CVE-2006-3435, CVE-2006-3876, CVE-2006-3877, CVE-2006-4694
- CVSS Scores
- Base 9.3 / Temporal 7.7
- Description
-
Microsoft PowerPoint is prone to multiple remote code execution vulnerabilities. An attacker could exploit these vulnerabilities by constructing a specially-crafted PowerPoint file that could allow remote code execution. Such files might be included in e-mail attachments or hosted on malicious web sites.
Affected versions include PowerPoint 2000, PowerPoint 2002, PowerPoint 2003, PowerPoint 2004 for Mac and PowerPoint v.X for Mac.
- Consequence
- If a user is logged in with administrative rights, then an attacker who successfully exploits this vulnerability could take complete control of an affected system. The attacker could then install programs; view, change, or delete data; and create new accounts with full user rights.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Microsoft Office 2000 Service Pack 3 :
http://www.microsoft.com/downloads/details.aspx?FamilyId=14A61FDA-BFE2-47CA-8313-40B772359994Microsoft Office XP Service Pack 3 :
http://www.microsoft.com/downloads/details.aspx?FamilyId=0FBD66FB-28BB-4587-9425-AD4A3F10651DMicrosoft Office 2003 Service Pack 1 or Service Pack 2 :
http://www.microsoft.com/downloads/details.aspx?FamilyId=D0E30F77-B48F-4B8B-A6FA-105A354B1A4EMicrosoft Office 2004 for Mac (Microsoft PowerPoint 2004 for Mac ):
http://www.microsoft.com/mac/Microsoft Office v. X for Mac (Microsoft PowerPoint v. X for Mac ):
http://www.microsoft.com/mac/Refer to Micrsoft Security Bulletin MS06-058 for further details.
-
Microsoft Excel Multiple Remote Code Execution Vulnerabilities (MS06-059)
- Severity
- Urgent 5
- Qualys ID
- 110045
- Vendor Reference
- MS06-059
- CVE Reference
- CVE-2006-2387, CVE-2006-3431, CVE-2006-3867, CVE-2006-3875
- CVSS Scores
- Base 7.5 / Temporal 6.2
- Description
-
Microsoft Excel is prone to multiple remote code execution vulnerabilities. An attacker could exploit this vulnerability when Excel parses a Lotus 1-2-3 file or parses a file that involves processesing a malformed DATETIME, STYLE or COLINFO record.
Affected versions of Microsoft Excel include Excel 2000, Excel 2002, Excel 2003, Excel 2004 for Mac and Excel v.X for Mac.
- Consequence
- If a user is logged in with administrative user rights, then an attacker who successfully exploits this vulnerability could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; and create new accounts with full user rights.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Microsoft Office 2000 Service Pack 3 (Microsoft Excel 2000 ):
http://www.microsoft.com/downloads/details.aspx?FamilyId=A4B2A672-481B-4AF6-89FE-DE8D321D99E0Microsoft Office XP Service Pack 3 (Microsoft Excel 2002 ):
http://www.microsoft.com/downloads/details.aspx?FamilyId=D86620E8-C77A-45A9-9FF3-0A6AAF308984Microsoft Office 2003 Service Pack 1 or Service Pack 2 (Microsoft Office Excel 2003 ):
http://www.microsoft.com/downloads/details.aspx?FamilyId=A81A8537-E2B0-4629-8973-40C4F32D9728Microsoft Office 2003 Service Pack 1 or Service Pack 2 (Microsoft Office Excel Viewer 2003 ):
http://www.microsoft.com/downloads/details.aspx?FamilyId=74C72657-634D-4C31-A366-C68043FE3B34Microsoft Office 2004 for Mac (Microsoft Excel 2004 for Mac ):
http://www.microsoft.com/mac/Microsoft Office v. X for Mac (Microsoft Excel v. X for Mac ):
http://www.microsoft.com/mac/Microsoft Works Suites (Microsoft Works Suite 2004 ):
http://www.microsoft.com/downloads/details.aspx?FamilyId=D86620E8-C77A-45A9-9FF3-0A6AAF308984Microsoft Works Suites (Microsoft Works Suite 2005 ):
http://www.microsoft.com/downloads/details.aspx?FamilyId=D86620E8-C77A-45A9-9FF3-0A6AAF308984Microsoft Works Suites (Microsoft Works Suite 2006 ):
http://www.microsoft.com/downloads/details.aspx?FamilyId=D86620E8-C77A-45A9-9FF3-0A6AAF308984Refer to Micrsoft Security Bulletin MS06-059 for further details.
-
Microsoft Word Remote Code Execution Vulnerabilities (MS06-060)
- Severity
- Urgent 5
- Qualys ID
- 110046
- Vendor Reference
- MS06-060
- CVE Reference
- CVE-2006-3647, CVE-2006-3651, CVE-2006-4534, CVE-2006-4693
- CVSS Scores
- Base 9.3 / Temporal 7.7
- Description
- Microsoft update MS06-060 patches multiple Microsoft Word vulnerabilities, including a Microsoft Word Vulnerability that is triggered when reading a malformed file, a Microsoft Word Mail Merge Vulnerability, a Microsoft Word Malformed Stack Vulnerability and a Microsoft Word for Mac Vulnerability.
- Consequence
- An attacker could take complete control of the client workstation when a user is logged in to a vulnerable version of Microsoft Office with administrative user rights.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Microsoft Office 2000 Service Pack 3 :
http://www.microsoft.com/downloads/details.aspx?FamilyId=CFC85449-4941-4DA5-A919-1DA388054E83Microsoft Office XP Service Pack 3 :
http://www.microsoft.com/downloads/details.aspx?FamilyId=5652303E-04B3-4713-AF2E-2C8D2450468DMicrosoft Office 2003 Service Pack 1 or Service Pack 2 (Microsoft Office Word 2003):
http://www.microsoft.com/downloads/details.aspx?FamilyId=30C516EB-BD63-4248-A34D-47AF7E9EA55AMicrosoft Office 2003 Service Pack 1 or Service Pack 2 (Microsoft Office Word 2003 Viewer ):
http://www.microsoft.com/downloads/details.aspx?FamilyId=EB230319-14A5-4206-A601-CF9DDE89352AMicrosoft Works Suites (Microsoft Works Suite 2004 ):
http://www.microsoft.com/downloads/details.aspx?FamilyId=5652303E-04B3-4713-AF2E-2C8D2450468DMicrosoft Works Suites (Microsoft Works Suite 2005 ):
http://www.microsoft.com/downloads/details.aspx?FamilyId=5652303E-04B3-4713-AF2E-2C8D2450468DMicrosoft Works Suites (Microsoft Works Suite 2006 ):
http://www.microsoft.com/downloads/details.aspx?FamilyId=5652303E-04B3-4713-AF2E-2C8D2450468DMicrosoft Office 2004 for Mac :
http://www.microsoft.com/mac/Microsoft Office v. X for Mac :
http://www.microsoft.com/mac/Refer to Microsoft Security Bulletin MS06-060 for further details.
-
Microsoft XML Core Services Remote Code Execution Vulnerability (MS06-061)
- Severity
- Urgent 5
- Qualys ID
- 90356
- Vendor Reference
- MS06-061
- CVE Reference
- CVE-2006-4685, CVE-2006-4686
- CVSS Scores
- Base 7.5 / Temporal 5.5
- Description
- Microsoft XML Core Services, formerly known as the Microsoft XML Parser, allows customers to build XML-based applications that provide an interoperability with other applications that adhere to the XML 1.0 standard. An information disclosure vulnerability exists because the XMLHTTP ActiveX control incorrectly interprets an HTTP server-side redirect and an issue exists in XSLT processing that could allow remote code execution on the target host.
- Consequence
- If a user is logged in with administrative user rights, then an attacker who successfully exploits this vulnerability could take complete control of the affected system.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Microsoft XML Parser 2.6 (all versions) and Microsoft XML Core Services 3.0 (all versions) on Windows 2000 Service Pack 4 :
http://www.microsoft.com/downloads/details.aspx?FamilyId=f9d16d74-1785-4c33-b1fc-df5258dd1089Microsoft XML Parser 2.6 (all versions) and Microsoft XML Core Services 3.0 (all versions) on Microsoft Windows XP Service Pack 1 :
http://www.microsoft.com/downloads/details.aspx?FamilyId=8a455c3b-213c-4395-87e9-9895f2b9a6edMicrosoft XML Parser 2.6 (all versions) and Microsoft XML Core Services 3.0 (all versions) on Microsoft Windows XP Service Pack 2 :
http://www.microsoft.com/downloads/details.aspx?FamilyId=8a455c3b-213c-4395-87e9-9895f2b9a6edMicrosoft XML Parser 2.6 (all versions) and Microsoft XML Core Services 3.0 (all versions) on Microsoft Windows XP Professional x64 Edition :
http://www.microsoft.com/downloads/details.aspx?FamilyId=5593333f-bcd5-4750-a23d-4f7fccda6493Microsoft XML Parser 2.6 (all versions) and Microsoft XML Core Services 3.0 (all versions) on Microsoft Windows Server 2003 :
http://www.microsoft.com/downloads/details.aspx?FamilyId=09b77b2a-a4fd-46e2-af15-2385790c9ee7Microsoft XML Parser 2.6 (all versions) and Microsoft XML Core Services 3.0 (all versions) on Microsoft Windows Server 2003 Service Pack 1 :
http://www.microsoft.com/downloads/details.aspx?FamilyId=09b77b2a-a4fd-46e2-af15-2385790c9ee7Microsoft XML Parser 2.6 (all versions) and Microsoft XML Core Services 3.0 (all versions) on Microsoft Windows Server 2003 for Itanium based Systems and Microsoft Windows Server 2003 with SP1 for Itanium based Systems :
http://www.microsoft.com/downloads/details.aspx?FamilyId=31c88513-29df-475b-b9ae-a2f5c1f32a8cMicrosoft XML Parser 2.6 (all versions) and Microsoft XML Core Services 3.0 (all versions) on Microsoft Windows Server 2003 x64 Edition :
http://www.microsoft.com/downloads/details.aspx?FamilyId=6183a9d2-89f5-4b25-be8b-090c6e050740Microsoft Office 2003 Service Pack 1 or Service Pack 2 with Microsoft XML Core Services 5.0 Service Pack 1 :
http://www.microsoft.com/downloads/details.aspx?FamilyId=8A37C111-D8E9-4C2E-9674-169B3331491CRefer to Microsoft Security Bulletin MS06-061 for further details.
-
Microsoft Office Remote Code Execution Vulnerabilities (MS06-062)
- Severity
- Critical 4
- Qualys ID
- 110044
- Vendor Reference
- MS06-062
- CVE Reference
- CVE-2006-3434, CVE-2006-3650, CVE-2006-3864, CVE-2006-3868
- CVSS Scores
- Base 9.3 / Temporal 6.9
- Description
-
Microsoft Office is exposed to several security issues listed below. Microsoft update MS06-062 addresses these issues.
- Office Improper Memory Access Vulnerability (CVE-2006-3434)
- Office Malformed Chart Record Vulnerability (CVE-2006-3650)
- Office Malformed Record Memory Corruption Vulnerability (CVE-2006-3864)
- Office Smart Tag Parsing Vulnerability (CVE-2006-3868)
- Consequence
- If these vulnerabilities are successfully exploited, a remote attacker could gain complete control of a vulnerable machine.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Microsoft Office 2000 Service Pack 3 :
http://www.microsoft.com/downloads/details.aspx?FamilyId=E0C7E1E4-7859-4C7E-898E-1CF05014885BMicrosoft Office XP Service Pack 3 :
http://www.microsoft.com/downloads/details.aspx?FamilyId=958EE063-D88D-4E45-8555-4D1C4730F5C8Microsoft Office 2003 Service Pack 1 or Service Pack 2 :
http://www.microsoft.com/downloads/details.aspx?FamilyId=0D399F68-EC0D-4768-9846-B16B3DADF247Microsoft Project 2000 Service Release 1 :
http://www.microsoft.com/downloads/details.aspx?FamilyId=266A9870-CD03-45CA-877B-B5AD2C873FE5Microsoft Project 2002 Service Pack 1 :
http://www.microsoft.com/downloads/details.aspx?FamilyId=A77DEA18-D237-4BB0-9464-CE31B6AE52D6Microsoft Visio 2002 Service Pack 2 :
http://www.microsoft.com/downloads/details.aspx?FamilyId=FD4B7660-0FC5-43E5-9683-B6DAE96136BBMicrosoft Office 2004 for Mac :
http://www.microsoft.com/mac/Microsoft Office v. X for Mac :
http://www.microsoft.com/mac/Refer to Microsoft Security Bulletin MS06-062 for further details.
-
Microsoft Server Service Denial of Service Vulnerability (MS06-063)
- Severity
- Serious 3
- Qualys ID
- 90354
- Vendor Reference
- MS06-063
- CVE Reference
- CVE-2006-3942, CVE-2006-4696
- CVSS Scores
- Base 9 / Temporal 7.4
- Description
- Microsoft Server Service is exposed to the following issues: Server Service Denial of Service Vulnerability (CVE-2006-3942) and SMB Rename Vulnerability (CVE-2006-4696). This is due to improper handling of certain network packets. An attacker could exploit the vulnerability by sending a specially-crafted network message to a computer running the Server Service.
- Consequence
- If this vulnerability is successfully exploited, the affected computer may stop responding.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Microsoft Windows 2000 Service Pack 4 :
http://www.microsoft.com/downloads/details.aspx?FamilyId=2998105d-6796-4e60-8c9c-e8241385f2a9Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2 :
http://www.microsoft.com/downloads/details.aspx?FamilyId=08ab17b9-149c-44d4-96cf-87a8c6b9dc22Microsoft Windows XP Professional x64 Edition :
http://www.microsoft.com/downloads/details.aspx?FamilyId=433fd0f9-938f-432d-99d4-f41b92235dcfMicrosoft Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1 :
http://www.microsoft.com/downloads/details.aspx?FamilyId=abad4cc1-4ea6-4051-bc5a-79deb4dbe72bMicrosoft Windows Server 2003 for Itanium based Systems and Microsoft Windows Server 2003 with SP1 for Itanium based Systems :
http://www.microsoft.com/downloads/details.aspx?FamilyId=849eedef-332b-4792-b84e-3750d407a86fMicrosoft Windows Server 2003 x64 Edition :
http://www.microsoft.com/downloads/details.aspx?FamilyId=31e448f7-298d-417c-a857-1646689e0817Refer to Microsoft Security Bulletin MS06-063 for further details.
-
Microsoft TCP/IP IPv6 Denial of Service Vulnerabilities (MS06-064)
- Severity
- Serious 3
- Qualys ID
- 90353
- Vendor Reference
- MS06-064
- CVE Reference
- CVE-2004-0230, CVE-2004-0790, CVE-2005-0688
- CVSS Scores
- Base 5 / Temporal 3.9
- Description
- Multiple denial of service vulnerabilities exist in the IPv6 Windows implementation of TCP.
- Consequence
- Successful exploitation of these vulnerabilities could result in a denial of service by causing the affected system to drop existing TCP connections.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2 :
http://www.microsoft.com/downloads/details.aspx?FamilyId=9fd73d12-ff7c-411d-944d-a6f147b20775Microsoft Windows XP Professional x64 Edition :
http://www.microsoft.com/downloads/details.aspx?FamilyId=fc98f55c-520e-4a68-a3c3-0df51c6122bbMicrosoft Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1 :
http://www.microsoft.com/downloads/details.aspx?FamilyId=102591a0-2b58-497b-bc20-593571b96e9cMicrosoft Windows Server 2003 for Itanium based Systems and Microsoft Windows Server 2003 with SP1 for Itanium based Systems :
http://www.microsoft.com/downloads/details.aspx?FamilyId=12515d47-134d-4d1f-9ae7-f0a7167ec424Microsoft Windows Server 2003 x64 Edition :
http://www.microsoft.com/downloads/details.aspx?FamilyId=c5faba34-48f5-4875-a0fa-6b8207f9b276Refer to Microsoft Security Bulletin MS06-064 for further details.
-
Microsoft Windows Object Packager Remote Code Execution Vulnerability (MS06-065)
- Severity
- Urgent 5
- Qualys ID
- 90355
- Vendor Reference
- MS06-065
- CVE Reference
- CVE-2006-4692
- CVSS Scores
- Base 5.1 / Temporal 3.8
- Description
- A remote code execution vulnerability exists in Microsoft Windows Object Packager because of the way that file extensions are handled. An attacker could exploit this vulnerability by constructing a specially-crafted file. This could potentially allow remote code execution if an unsuspecting user visits a specially-crafted Web site.
- Consequence
- Successful exploitation of this vulnerability could result in a complete compromise of the affected system.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2 :
http://www.microsoft.com/downloads/details.aspx?FamilyId=86c2b78e-53bf-4ddd-88f6-5d12c6d18c90Microsoft Windows XP Professional x64 Edition :
http://www.microsoft.com/downloads/details.aspx?FamilyId=2ac72356-7772-41b6-b4a6-7215c89f7347Microsoft Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1 :
http://www.microsoft.com/downloads/details.aspx?FamilyId=e2f5b9f9-4481-44f9-9aef-1af0afae8319Microsoft Windows Server 2003 for Itanium based Systems and Microsoft Windows Server 2003 with SP1 for Itanium based Systems :
http://www.microsoft.com/downloads/details.aspx?FamilyId=8c9a22a6-bd61-4fd4-9aa4-012d745046daMicrosoft Windows Server 2003 x64 Edition :
http://www.microsoft.com/downloads/details.aspx?FamilyId=ec4f4f72-8467-4964-ad28-ed9ea7562e0bRefer to Microsoft Security Bulletin MS06-065 for further details.
These new vulnerability checks are included in Qualys vulnerability signature 1.15.76-4. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
Selective Scan Instructions Using Qualys
To perform a selective vulnerability scan, configure a scan profile to use the following options:
- Ensure access to TCP ports 135 and 139 are available.
- Enable Windows Authentication (specify Authentication Records).
-
Enable the following Qualys IDs:
- 90357
- 90352
- 110043
- 110045
- 110046
- 90356
- 110044
- 90354
- 90353
- 90355
- If you would like the scan to return the Windows Hostname, also include QID 82044 and ensure access to UDP port 137 is available.
- If you would like to be notified if Qualys is unable to log on to a host (if Authentication fails), also include QID 105015.
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Access for Qualys Customers
Platforms and Platform Identification
Technical Support
For more information, customers may contact Qualys Technical Support.
About Qualys
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.