Top 25 Remediations by Risk With Details
Top 25 Remediations by Risk With Details
Will Remediate
Remediated Affected
Remediations Risk
Vulns Assets
Affected Assets
Install the latest version of Mozilla Firefox from the Mozilla Products page.
Affected Assets
2 of 12
Name IP Address Site
wsus_server.pslab.rapid7.com 10.3.60.112 Southern California Region
Install the latest version of Mozilla Firefox ESR from the Mozilla Products page.
Affected Assets
Affected Assets
Install latest version of Google Chrome from the Google Chrome page.
Affected Assets
3 of 12
6. Upgrade to the latest version of Apache HTTPD
Remediation Steps
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.4.tar.gz
Affected Assets
http://www.postgresql.org/download/
Affected Assets
http://us1.samba.org/samba/ftp/old-versions/samba-3.0.33.tar.gz
Affected Assets
4 of 12
9. Enable authorization for linux single user mode
Remediation Steps
Refer to your vendor's documentation for exact details on enabling authorization for single user mode, however on
systems that still use /etc/inittab, this involves adding the following line:
~:S:wait:/sbin/sulogin
Affected Assets
Linux
Source routing is disabled by default. On Linux kernel 2.2 and earlier, this setting was controlled by the contents of
the following proc file:
/proc/sys/net/ipv4/conf/all/accept_source_route
However, in more recent versions of Linux, the source route setting is controlled by several sysctl variables. Issue
the following command to drop all source routed packets:
/sbin/sysctl -w net.ipv4.conf.all.accept_source_route=0
Also, issue the following commands to disable forwarding of any frames with source routing options:
/sbin/sysctl -w net.ipv4.conf.all.forwarding=0
/sbin/sysctl -w net.ipv4.conf.all.mc_forwarding=0
These settings can be added to /etc/sysctl.conf to make them permanent.
You should also consider blocking or "scrubbing" source routed packets at your firewall (i.e. either reject
source routed packets or have the firewall remove the source routing options if possible).
Affected Assets
5 of 12
Name IP Address Site
Unknown 10.3.60.110 Southern California Region
Microsoft Windows
Configure the system to enable or require SMB signing as appropriate. The method and effect of doing this is system
specific so please see this TechNet article for details. Note: ensure that SMB signing configuration is done for
incoming connections (Server).
Affected Assets
Update xulrunner-devel to the latest version available from CentOS, using tools like yum or up2date.
Because CentOS RPMs are built off of RedHat SRPMs, there is a delay between when a vulnerability is published and
fixed in the RedHat SRPMs and the time that CentOS in turn rebuilds and redistributes the updated RPMs. As such, there
may be cases where the updated RPM(s) listed here might not exist in the CentOS RPM repositories yet.
Affected Assets
6 of 12
13. Upgrade xulrunner
Remediation Steps
Update xulrunner to the latest version available from CentOS, using tools like yum or up2date.
Because CentOS RPMs are built off of RedHat SRPMs, there is a delay between when a vulnerability is published and
fixed in the RedHat SRPMs and the time that CentOS in turn rebuilds and redistributes the updated RPMs. As such, there
may be cases where the updated RPM(s) listed here might not exist in the CentOS RPM repositories yet.
Affected Assets
Update xulrunner-debuginfo to the latest version available from CentOS, using tools like yum or up2date.
Because CentOS RPMs are built off of RedHat SRPMs, there is a delay between when a vulnerability is published and
fixed in the RedHat SRPMs and the time that CentOS in turn rebuilds and redistributes the updated RPMs. As such, there
may be cases where the updated RPM(s) listed here might not exist in the CentOS RPM repositories yet.
Affected Assets
7 of 12
15. Disable ICMP redirect support
Remediation Steps
Linux
Affected Assets
Affected Assets
8 of 12
17. Download and install Microsoft patch windowsserver2003.windowsxp-kb2508429-x64-
enu.exe (1044864 bytes)
Remediation Steps
Affected Assets
Microsoft Windows XP Professional SP3 (x86), Microsoft Windows XP Home SP3 (x86)
Download and apply the patch from:
http://download.windowsupdate.com/msdownload/update/software/secu/2011/03/windowsxp-kb2508429-x86-
enu_e0b40d81f2ecc1bad43439a6bd0a9e2a0ab7dd56.exe
http://download.windowsupdate.com/msdownload/update/software/secu/2011/03/windowsxp-kb2508429-
x86-enu_e0b40d81f2ecc1bad43439a6bd0a9e2a0ab7dd56.exe
Affected Assets
Set a password in the GRUB configuration file. This is often located in one of several locations, but can really be
anywhere:
/etc/grub.conf
/boot/grub/grub.conf
/boot/grub/menu.lst
To set a plain-text password, edit your GRUB configuration file and add the following line before the
first uncommented line:
password <password>
To set an encrypted password, run grub-md5-crypt and use its output when adding the following line before the
first uncommented line:
password --md5 <encryptedpassword>
For either approach, choose an appropriately strong password.
9 of 12
Affected Assets
Update firefox to the latest version available from CentOS, using tools like yum or up2date.
Because CentOS RPMs are built off of RedHat SRPMs, there is a delay between when a vulnerability is published and
fixed in the RedHat SRPMs and the time that CentOS in turn rebuilds and redistributes the updated RPMs. As such, there
may be cases where the updated RPM(s) listed here might not exist in the CentOS RPM repositories yet.
Affected Assets
Update firefox-debuginfo to the latest version available from CentOS, using tools like yum or up2date.
Because CentOS RPMs are built off of RedHat SRPMs, there is a delay between when a vulnerability is published and
fixed in the RedHat SRPMs and the time that CentOS in turn rebuilds and redistributes the updated RPMs. As such, there
may be cases where the updated RPM(s) listed here might not exist in the CentOS RPM repositories yet.
Affected Assets
10 of 12
22. Edit '/etc/securetty' entries
Remediation Steps
Remove all the entries in /etc/securetty except console, tty[0-9]* and vc\[0-9]*
Note: ssh does not use /etc/securetty. To disable root login through ssh, use the "PermitRootLogin" setting
in /etc/ssh/sshd_config and restart the ssh daemon.
Affected Assets
Affected Assets
11 of 12
24. Restrict User's home directory mode
Remediation Steps
Restrict the user home directory mode to at most 750 using the command:
chmod 750 userDir
Affected Assets
Update java-1.6.0-openjdk-src to the latest version available from CentOS, using tools like yum or up2date.
Because CentOS RPMs are built off of RedHat SRPMs, there is a delay between when a vulnerability is published and
fixed in the RedHat SRPMs and the time that CentOS in turn rebuilds and redistributes the updated RPMs. As such, there
may be cases where the updated RPM(s) listed here might not exist in the CentOS RPM repositories yet.
Affected Assets
12 of 12