The TrustKeeper Scan Engine has been updated and is packed with even more wonderful goodness than ever before!
This update includes coverage for four recently discovered ISC BIND vulnerabilities. These vulnerabilities, when leveraged, can result in denial of service conditions and potential sensitive DNS cache information disclosure. All of these vulnerabilities are addressed as of the latest versions of BIND (9.7.6-P3, 9.8.3-P3, 9.9.1-P3, 9.4-ESV-R5-P2, and 9.6-ESV-R7-P3). We recommend upgrading to the latest versions as soon as possible.
This update also includes coverage for vulnerabilities in Oracle Enterprise Manager and Oracle MySQL Server, which were addressed in Oracle's latest Critical Patch Update (CPU) Advisory. If you haven't already applied this CPU to affected Oracle products, we recommend doing so as soon as possible.
Additionally, we've added coverage for a handful of PHP vulnerabilities including a recently discovered flaw in which attackers could use a specially-crafted URL to bypass an HTTP response-splitting protection mechanism. This bug was addressed in PHP 5.4.0, but we recommend upgrading to the latest version.
As always, a number of new vulnerability checks and improvements to existing tests were implemented based on feedback from our customers.