Security Center 3.4.1 Release Notes
The following details many of the changes that are included in version 3.4.1, the significant issues that have been resolved, as well as notes for upgrading. A PDF file of these release notes is also available here.
- As with any application, it is always wise to perform a backup of your Security Center installation before upgrading.
- A new default SSL certificate for Security Center is being provided in version 3.4.1 as the previous certificate expired on 5/22/08. This new certificate will be installed automatically. If you have your own SSL certificate installed, be sure to back it up prior to upgrading, and restore it afterwards.
Upgrading from 3.4.0
There are no special upgrade related notes. The command syntax for an RPM upgrade is as follows:
- rpm -Uvh <RPM Package File Name>
Upgrading from Pre-3.4.0 Security Center Versions
- Please note that existing scan policies, as well as scheduled and template scan files will be modified as part of the update process. Please be sure to verify these files after the upgrade.
- After upgrading to Security Center 3.4 you may experience a problem with the display of the text of tickets that are entered. The issue manifests when a single quote (') is used in the text of the ticket, in which an escape character (\) is added.
For Example: "This is the vulnerability that John\'s team was worried about."
The file /opt/sc3/support/etc/php.ini does not get updated by the upgrade process in order to protect any modifications that you have made. To correct this, edit the file and change the line that reads "magic_quotes_gpc = On" to "magic_quotes_gpc = Off". Restart the HTTPD services (use the command "service httpd restart") and the issue should be resolved. New installations of Security Center will have this setting off by default.
- Security Center v3.4 is the first version in which the Red Hat ES5 operating system is supported. Those existing SC customers wishing to migrate their installations to ES5 must first upgrade their current installation of SC to v3.4, then follow the OS migration procedures as documented in the Cerberus knowledge base article titled "Retaining Security Center 3 install when installing new OS".
- A global change with regard to passwords has been made. At this time, all printing (non-control) characters of the ASCII character set are acceptable for passwords in all password fields within Security Center with the following exceptions:
Character Description < Less than sign > Greater than sign , Comma " Quotation Mark (aka Double Quote)
- The new Firefox v3.0 browser has been tested with Security Center and all issues found have been resolved.
- The third-party library, libpng, has been upgraded to version 1.2.27. A security vulnerability had been discovered the previous version of the library and has been resolved in this version.
- The PHP scripting language which is used by Security Center has been upgraded to the latest version available, version 5.2.6.
- The third-party library, OpenSSL, used in Security Center was updated to version 0.9.8h, which is the latest version available. This library was updated to resolve discovered security issues.
Data Query Tools/Query Results Display
- An issue was resolved with the Time Direction Summary tool, in which it would return no results when used with the 'Type' filter.
- An issue has been resolved in which end-users of the Security Center system which have privileges for policy scanning were able to initiate individual plugins scans from certain portions of the interface.
- Previously, when selecting a scan policy in the Add Scan function, the policy identification numbers were not provided along with the policy names.
- An issue has been resolved in which dependent scans would run properly the first time they were triggered, but would fail to run afterwards.
- An issue has been resolved which would cause a scan initiated using SSH local checks to produce errors on the Additional Information page of scan management.
- An issue has been resolved with scanning in which using an asset list which is configured with SMB credentials would not run.
- Deleting user accounts which used LDAP authentication would previously not result in complete removal of the account.
- A modification has been made to the logging of PVS plugin updates so that they are less verbose by default. This has been done to make the admin log more usable.
- Several role related permissions issues have been resolved for both manager and end-user account types.
- There was previously an error generated, only when running Security Center on Red Hat ES5, when adding a Nessus scanner and selecting "Authenticate with an SSL certificate".
- Customers using many asset lists and long names for each list will no longer experience problems when assigning large numbers of asset lists to users. This problem was noted when using Microsoft Internet Explorer, but it was possible to see it in other browsers.
- An issue has been resolved in which very long passwords were not being accepted for login, essentially locking out the account.
- Issues in certain XML report templates which would result in error messages when running the report have been resolved.
- The Service Detection report chapter would not show the ports on which a service was found.
- Several issues related to uploading .nessus files have been resolved.
- The facility has been added for downloading a .nessus file from scan data which has been manually imported to the Security Center.
IDS & LCE/Thunder Related
- An issue in Analyze Logs prevented the viewing of Raw Syslog events beyond the first twenty-five.
- A problem has been resolve that caused Snort IDS signature updates to fail without notification.