Microsoft security alert.
February 14, 2012
Advisory overview
Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 21 vulnerabilities that were fixed in 9 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Vulnerability details
Microsoft has released 9 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
-
Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerability (MS12-008)
- Severity
- Urgent 5
- Qualys ID
- 90775
- Vendor Reference
- MS12-008
- CVE Reference
- CVE-2011-5046, CVE-2012-0154
- CVSS Scores
- Base 9.3 / Temporal 7.7
- Description
-
The Windows kernel is the core of the operating system. It provides system-level services such as device management and memory management, allocates processor time to processes, and manages error handling.
Windows kernel is prone to the following remote code execution vulnerabilities:
A remote code execution vulnerability exists in the Windows kernel due to improper validation of input passed from user mode through the kernel component of GDI. (CVE-2011-5046)An elevation of privilege vulnerability exists due to the way the Windows kernel-mode driver manages specific keyboard layouts. (CVE-2012-0154)
Affected Software:
Windows XP Service Pack 3
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Vista Service Pack 2
Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems and Windows Server 2008 R2 for x64-based Systems Service Pack 1This security update is rated Critical.
Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
February 2012 Security Updates are Live on ECE for XPe and Standard 2009 (KB2660465)
- Consequence
- An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems Service Pack 2
Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1
Refer to Microsoft Security Bulletin MS12-008 for further information.
-
Microsoft SharePoint Elevation of Privilege Vulnerability (MS12-011)
- Severity
- Serious 3
- Qualys ID
- 90777
- Vendor Reference
- MS12-011
- CVE Reference
- CVE-2012-0017, CVE-2012-0144, CVE-2012-0145
- CVSS Scores
- Base 4.3 / Temporal 3.2
- Description
-
Microsoft SharePoint makes it easier for people to work together. Using SharePoint, people can set up Web sites to share information with others, manage documents from start to finish, and publish reports to help everyone make better decisions.
A cross-site scripting vulnerability exists in Microsoft SharePoint 2010, this vulnerability occurs when Microsoft SharePoint does not properly handle malicious JavaScript elements contained within a specially crafted URL, allowing the script to be displayed back to the user's browser. (CVE-2012-0017, CVE-2012-0144, CVE-2012-0145)
Affected Software:
Microsoft SharePoint Server 2010 and Microsoft SharePoint Server 2010 Service Pack 1
Microsoft SharePoint Foundation 2010 and Microsoft SharePoint Foundation 2010 Service Pack 1This security update is rated Important.
- Consequence
- Successful exploitation allows elevation of privilege or information disclosure.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Microsoft SharePoint Server 2010 and Microsoft SharePoint Server 2010 Service Pack 1
Microsoft SharePoint Foundation 2010 and Microsoft SharePoint Foundation 2010 Service Pack 1
Refer to Microsoft Security Bulletin MS12-011 for further information.
-
Microsoft Windows Indeo Codec Remote Code Execution (MS12-014)
- Severity
- Critical 4
- Qualys ID
- 119944
- Vendor Reference
- MS12-014
- CVE Reference
- CVE-2010-3138
- CVSS Scores
- Base 9.3 / Temporal 7.3
- Description
-
The Indeo Codec is a codec that decompresses digital media files. Microsoft Windows Media Player and other applications that handle media rich content use the codec.
The Indeo Codec is vulnerable to remote code execution because it incorrectly restricts the path used for loading external libraries.
This security update is rated Important for Windows XP.
Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
February 2012 Security Updates are Live on ECE for XPe and Standard 2009 (KB2661637)
- Consequence
- An attacker could execute arbitrary code on vulnerable installations of Microsoft Windows Media Player.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Refer to Microsoft Security Bulletin MS12-014 for further details.
-
Microsoft Ancillary Function Driver Elevation of Privilege (MS12-009)
- Severity
- Critical 4
- Qualys ID
- 90776
- Vendor Reference
- MS12-009
- CVE Reference
- CVE-2012-0148, CVE-2012-0149
- CVSS Scores
- Base 7.2 / Temporal 5.3
- Description
-
The Ancillary Function Driver supports Windows sockets applications and is contained in the afd.sys file.
An elevation of privilege vulnerability exists where the Ancillary Function Driver (afd.sys) improperly validates input passed from user mode to the kernel.
Microsoft has released a security update that addresses the vulnerability by correcting the way AFD validates input before passing the input from user mode to the Windows kernel.
This security update is rated Important for Windows XP, Windows 2003, Vista, Windows Server 2008, Windows 7 and Windows 2008 R2.
- Consequence
- If this vulnerability is successfully exploited, a local attacker can execute arbitrary code and take complete control of an affected system.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems Service Pack 2
Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1
Refer to Microsoft Security Bulletin MS12-009 for further details.
-
Microsoft Visio Viewer 2010 Remote Code Execution Vulnerability (MS12-015)
- Severity
- Critical 4
- Qualys ID
- 110175
- Vendor Reference
- MS12-015
- CVE Reference
- CVE-2012-0019, CVE-2012-0020, CVE-2012-0136, CVE-2012-0137, CVE-2012-0138
- CVSS Scores
- Base 9.3 / Temporal 7.7
- Description
-
Microsoft Visio is diagramming software for Microsoft Windows. It uses vector graphics to create diverse diagrams.
This security update resolves five privately reported vulnerabilities in Microsoft Office by correcting the way that Microsoft Visio Viewer validates data when parsing specially crafted Visio files.
This security update is rated Important for all supported editions of Microsoft Visio Viewer 2010. Affected Software:-
Microsoft Visio Viewer 2010 and Microsoft Visio Viewer 2010 Service Pack 1 (32-bit editions)
Microsoft Visio Viewer 2010 and Microsoft Visio Viewer 2010 Service Pack 1 (64-bit editions) - Consequence
- The vulnerabilities could allow remote code execution if a user opens a specially crafted Visio file. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Microsoft Visio Viewer 2010 and Microsoft Visio Viewer 2010 Service Pack 1 (32-bit editions)
Microsoft Visio Viewer 2010 and Microsoft Visio Viewer 2010 Service Pack 1 (64-bit editions)
Refer to Microsoft Security Bulletin MS12-015.
-
Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (MS12-016)
- Severity
- Critical 4
- Qualys ID
- 90774
- Vendor Reference
- MS12-016
- CVE Reference
- CVE-2012-0014, CVE-2012-0015
- CVSS Scores
- Base 9.3 / Temporal 7.7
- Description
-
Microsoft Silverlight is a cross-browser, cross-platform implementation of the Microsoft .NET Framework for building media experiences and rich interactive applications for the Web.
A remote code execution vulnerability exists in Microsoft .NET Framework and Silverlight that can allow a specially crafted Microsoft .NET Framework application to access memory in an unsafe manner. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user (CVE-2012-0014).
A remote code execution vulnerability exists in Microsoft .NET Framework because it improperly calculating a buffer length while processing specially crafted input. An attacker who successfully exploited this vulnerability could take complete control of an affected system (CVE-2012-0015).
This security update is rated Critical for Microsoft .NET Framework 2.0 Service Pack 2, Microsoft .NET Framework 3.5.1, and Microsoft .NET Framework 4 on all supported editions of Microsoft Windows and for Microsoft Silverlight 4.
Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
February 2012 Security Updates are Live on ECE for XPe and Standard 2009 (KB2633870, 2633880)
- Consequence
- Successfully exploiting these vulnerabilities might allow a remote attacker to execute arbitrary code.
- Solution
-
For a complete list of patch download links, please refer to Microsoft Security Bulletin MS12-016.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS12-016 Microsoft Silverlight 4
MS12-016 Microsoft Silverlight 4
MS12-016 Microsoft Silverlight 4
MS12-016 Windows 7 for 32-bit Systems(Microsoft .NET Framework 3.5.1)
MS12-016 Windows 7 for 32-bit Systems(Microsoft .NET Framework 4)
MS12-016 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS12-016 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 4)
MS12-016 Windows 7 for x64-based Systems(Microsoft .NET Framework 3.5.1)
MS12-016 Windows 7 for x64-based Systems(Microsoft .NET Framework 4)
MS12-016 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS12-016 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4)
MS12-016 Windows Server 2003 Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS12-016 Windows Server 2003 Service Pack 2(Microsoft .NET Framework 4)
MS12-016 Windows Server 2003 with SP2 for Itanium-based Systems(Microsoft .NET Framework 2.0 Service Pack 2)
MS12-016 Windows Server 2003 with SP2 for Itanium-based Systems(Microsoft .NET Framework 4)
MS12-016 Windows Server 2003 x64 Edition Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS12-016 Windows Server 2003 x64 Edition Service Pack 2(Microsoft .NET Framework 4)
MS12-016 Windows Server 2008 R2 for Itanium-based Systems(Microsoft .NET Framework 3.5.1)
MS12-016 Windows Server 2008 R2 for Itanium-based Systems(Microsoft .NET Framework 4)
MS12-016 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS12-016 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(Microsoft .NET Framework 4)
MS12-016 Windows Server 2008 R2 for x64-based Systems(Microsoft .NET Framework 3.5.1)
MS12-016 Windows Server 2008 R2 for x64-based Systems(Microsoft .NET Framework 4)
MS12-016 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS12-016 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4)
MS12-016 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS12-016 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 4)
MS12-016 Windows Server 2008 for Itanium-based Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS12-016 Windows Server 2008 for Itanium-based Systems Service Pack 2(Microsoft .NET Framework 4)
MS12-016 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS12-016 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 4)
MS12-016 Windows Vista Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS12-016 Windows Vista Service Pack 2(Microsoft .NET Framework 4)
MS12-016 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS12-016 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 4)
MS12-016 Windows XP Professional x64 Edition Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS12-016 Windows XP Professional x64 Edition Service Pack 2(Microsoft .NET Framework 4)
MS12-016 Windows XP Service Pack 3(Microsoft .NET Framework 2.0 Service Pack 2)
MS12-016 Windows XP Service Pack 3(Microsoft .NET Framework 4)
-
Microsoft Windows C Run-Time Library Remote Code Execution Vulnerability (MS12-013)
- Severity
- Urgent 5
- Qualys ID
- 90773
- Vendor Reference
- MS12-013
- CVE Reference
- CVE-2012-0150
- CVSS Scores
- Base 9.3 / Temporal 6.9
- Description
-
Msvcrt.dll is a multithreaded, C run-time dynamic link library that is used by system-level components.
The vulnerability occurs when msvcrt.dll miscalculates the size of a buffer, allowing data to be copied into memory that has not been properly allocated.
Microsoft has released a security update that addresses the vulnerability by modifying the way that the msvcrt dynamic link library (DLL) calculates the size of data structures in memory.
This security update is rated Critical for all supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2.
- Consequence
- An unauthenticated attacker who successfully exploited this vulnerability could take complete control of the affected system.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems Service Pack 2
Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1
Refer to Microsoft Security Bulletin MS12-013 for further details.
-
Microsoft Cumulative Security Update for Internet Explorer (MS12-010)
- Severity
- Critical 4
- Qualys ID
- 100115
- Vendor Reference
- MS12-010
- CVE Reference
- CVE-2012-0010, CVE-2012-0011, CVE-2012-0012, CVE-2012-0155
- CVSS Scores
- Base 9.3 / Temporal 7.3
- Description
-
Microsoft Internet Explorer is a Web browser for Microsoft Windows.
The security update resolves four privately reported vulnerabilities in Internet Explorer. The security update addresses the vulnerabilities by modifying the way that Internet Explorer handles content during copy and paste processes, handles objects in memory, and creates and initializes strings.
An information disclosure vulnerability exists in Internet Explorer that could allow an attacker to gain access to information in another domain or Internet Explorer zone. (CVE-2012-0010)
A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has been deleted. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the logged-on user. (CVE-2012-0011, CVE-2012-0155)
Another information disclosure vulnerability exists in Internet Explore that can be exploited by constructing a specially crafted web page disguised as legitimate content. (CVE-2012-0012)
This security update is rated Critical for Internet Explorer 7, Internet Explorer 8 and Internet Explorer 9 on Windows clients and Moderate for Internet Explorer 7, Internet Explorer 8 and Internet Explorer 9 on Windows servers. This security update is also rated Moderate for Internet Explorer 6 on all supported editions of Windows XP.
Affected Software:
Windows XP Service Pack 3 (Internet Explorer 6,Internet Explorer 7,Internet Explorer 8)
Windows XP Professional x64 Edition Service Pack 2 (Internet Explorer 6,Internet Explorer 7,Internet Explorer 8)
Windows Server 2003 Service Pack 2 (Internet Explorer 6,Internet Explorer 7,Internet Explorer 8)
Windows Server 2003 x64 Edition Service Pack 2 (Internet Explorer 6,Internet Explorer 7,Internet Explorer 8)
Windows Server 2003 with SP2 for Itanium-based Systems (Internet Explorer 6,Internet Explorer 7,Internet Explorer 8)
Windows Vista Service Pack 2 (Internet Explorer 6,Internet Explorer 7,Internet Explorer 8,Internet Explorer 9)
Windows Vista x64 Edition Service Pack 2(Internet Explorer 6,Internet Explorer 7,Internet Explorer 8,Internet Explorer 9)
Windows Server 2008 for 32-bit Systems Service Pack 2 (Internet Explorer 6,Internet Explorer 7,Internet Explorer 8,Internet Explorer 9)
Windows Server 2008 for x64-based Systems Service Pack 2 (Internet Explorer 6,Internet Explorer 7,Internet Explorer 8,Internet Explorer 9)
Windows Server 2008 for Itanium-based Systems Service Pack 2 (Internet Explorer 6,Internet Explorer 7,Internet Explorer 8,Internet Explorer 9)
Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1 (Internet Explorer 6,Internet Explorer 7,Internet Explorer 8,Internet Explorer 9)
Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1 (Internet Explorer 6,Internet Explorer 7,Internet Explorer 8,Internet Explorer 9)
Windows Server 2008 R2 for x64-based Systems and Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Internet Explorer 6,Internet Explorer 7,Internet Explorer 8,Internet Explorer 9)
Windows Server 2008 R2 for Itanium-based Systems and Windows Server 2008 R2 for Itanium-based Systems Service Pack 1 (Internet Explorer 6,Internet Explorer 7,Internet Explorer 8,Internet Explorer 9)Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
February 2012 Security Updates are Live on ECE for XPe and Standard 2009 (KB2647516)
- Consequence
- The most severe vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Windows XP Service Pack 3 (Internet Explorer 6)
Windows XP Professional x64 Edition Service Pack 2 (Internet Explorer 6)
Windows Server 2003 Service Pack 2 (Internet Explorer 6)
Windows Server 2003 x64 Edition Service Pack 2 (Internet Explorer 6)
Windows Server 2003 with SP2 for Itanium-based Systems (Internet Explorer 6)
Windows XP Service Pack 3 (Internet Explorer 7)
Windows XP Professional x64 Edition Service Pack 2 (Internet Explorer 7)
Windows Server 2003 Service Pack 2 (Internet Explorer 7)
Windows Server 2003 x64 Edition Service Pack 2 (Internet Explorer 7)
Windows Server 2003 with SP2 for Itanium-based Systems (Internet Explorer 7)
Windows Vista Service Pack 2 (Internet Explorer 7)
Windows Vista x64 Edition Service Pack 2 (Internet Explorer 7)
Windows Server 2008 for 32-bit Systems Service Pack 2 (Internet Explorer 7)
Windows Server 2008 for x64-based Systems Service Pack 2 (Internet Explorer 7)
Windows Server 2008 for Itanium-based Systems Service Pack 2 (Internet Explorer 7)
Windows XP Service Pack 3 (Internet Explorer 8)
Windows XP Professional x64 Edition Service Pack 2 (Internet Explorer 8)
Windows Server 2003 Service Pack 2 (Internet Explorer 8)
Windows Server 2003 x64 Edition Service Pack 2 (Internet Explorer 8)
For a complete list of patch download links, please refer to Microsoft Security Bulletin MS12-010.
-
Microsoft Windows Color Control Panel Remote Code Execution Vulnerability (MS12-012)
- Severity
- Critical 4
- Qualys ID
- 90772
- Vendor Reference
- MS12-012
- CVE Reference
- CVE-2010-5082
- CVSS Scores
- Base 9.3 / Temporal 6.9
- Description
-
Microsoft Windows Color Control Panel is prone to a vulnerability that could allow remote code execution if a user opens a legitimate file (such as an .icm or .icc file) that is located in the same directory as a specially crafted dynamic link library (DLL) file.
Microsoft has released a security update that addresses the vulnerability by correcting the manner in which the Color Control Panel loads external libraries.
This security update is rated Important for all supported editions of Windows Server 2008 and Windows Server 2008 R2.
- Consequence
- Exploitation could result in remote code execution.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems Service Pack 2
Refer to Microsoft Security Bulletin MS12-012 for further details.
Workaround:
1) Install Desktop Experience on Windows server 2008 and Windows Server 2008 R2 since systems with the Desktop Experience feature installed are not affected by this vulnerability.2) Disable loading of libraries from WebDAV and remote network shares
3) Disabling the WebClient service helps protect affected systems from attempts to exploit this vulnerability by blocking the most likely remote attack vector through the Web Distributed Authoring and Versioning (WebDAV) client service.
Impact of workaround#3: When the WebClient service is disabled, Web Distributed Authoring and Versioning (WebDAV) requests are not transmitted. In addition, any services that explicitly depend on the Web Client service will not start, and an error message will be logged in the System log.
4) Block TCP ports 139 and 445 at the firewall
Impact of workaround #4: Several Windows services use the affected ports. Blocking connectivity to the ports may cause various applications or services to not function.
These new vulnerability checks are included in Qualys vulnerability signature 2.2.50-3. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
Selective Scan Instructions Using Qualys
To perform a selective vulnerability scan, configure a scan profile to use the following options:
- Ensure access to TCP ports 135 and 139 are available.
- Enable Windows Authentication (specify Authentication Records).
-
Enable the following Qualys IDs:
- 90775
- 90777
- 119944
- 90776
- 110175
- 90774
- 90773
- 100115
- 90772
- If you would like the scan to return the Windows Hostname, also include QID 82044 and ensure access to UDP port 137 is available.
- If you would like to be notified if Qualys is unable to log on to a host (if Authentication fails), also include QID 105015.
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Access for Qualys Customers
Platforms and Platform Identification
Technical Support
For more information, customers may contact Qualys Technical Support.
About Qualys
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.