a quick note how to prove the vulnerability to be attacked by WannaCry (LinktoBBC).
Of course you can check the KB or Package Numbers in your patch catalog (Single Patches) - you should do that as well.
But to have a very quick check you can use the OVAL Scan with the CVE-Number.
And build yourself a report (break on 'CVE Number'):
SELECT MACHINE.NAME AS Computer,
MACHINE.LAST_INVENTORY AS `Last Inventory`,
OVAL_DEFINITION.SOURCE AS `CVE Number`
FROM (OVAL_STATUS OVAL_STATUS
INNER JOIN KBSYS.OVAL_DEFINITION OVAL_DEFINITION
ON (OVAL_STATUS.OVAL_DEFINITION_ID = OVAL_DEFINITION.ID))
INNER JOIN MACHINE MACHINE
ON (OVAL_STATUS.MACHINE_ID = MACHINE.ID)
WHERE ( OVAL_STATUS.RESULT = 'VULNERABLE'
AND OVAL_DEFINITION.SOURCE IN ('CVE-2017-0143',
'CVE-2017-0144',
'CVE-2017-0145',
'CVE-2017-0146',
'CVE-2017-0147',
'CVE-2017-0148'))
ORDER BY Computer ASC, `CVE Number` ASC
Hope i could help :)
Timo
modified the code so that it could run on everyones org / appliance :) - Timokirch 7 years ago
Reasons:
a.) you are up to date :)
b.) you didn't run an OVAL scan - Timokirch 7 years ago
[Tue May 16 6:04:51 PDT 2017] [notice] curl error: Failed to connect to service.kace.com port 443: Connection refused
[Tue May 16 6:04:51 PDT 2017] [notice] KOVALDefsUpdater - Failed to open KB_OVAL_DEFS_URL.
[Tue May 16 6:04:51 PDT 2017] [notice] KOVALDefsUpdater - http status:
[Tue May 16 6:04:51 PDT 2017] [notice] KOVALDefsUpdater - no http headers returned.
[Tue May 16 6:04:51 PDT 2017] [notice] KOVALDefsUpdater - Complete.
any idea whats going on? - Predator04 7 years ago
https://support.quest.com/contact-support - Timokirch 7 years ago
Also just noticed the following:Your patch subscription has expired. Please contact support for assistance. - tmac0701 7 years ago
thanks for your feedback. Please note that there are multiple patches in the catalog solving this problem.
If you think this is a misbehavior than you should contact support > https://support.quest.com/contact-support - Timokirch 7 years ago