System auditing

To assess the current patch level (i.e. missing updates resulting in vulnerabilities), the following commands and web sites are helpful for these operating systems:


Microsoft Windows

Microsoft Baseline Security Analyzer

Microsoft provides a tool for analyzing the current security patch level on local or remote systems called Baseline Security Analyzer. Of course, there are two versions (2.0 and 1.2.1) of MBSA available, scanning for different software.

MBSA requires the Windows Update Agent 2.0.
Caveat: MBSA installs this software automagically if you leave Configure computers for Microsoft Update and scanning prerequisites checked. This may not be suitable for production systems.

According to Microsoft, it is also necessary to enable these services for remote scanning:

On the local system, you have to be logged in as Administrator, with the same password that is used on the remote system. This has some interesting security (setting all administrative passwords to the same) or usability (changing your local admin password for every system scanned) implications.
MBSA is simply a genuine Microsoft tool !

In case MBSA cannot scan the system

Results of the scans are stored in directory C:\Documents and Settings\Administrator\SecurityScans

Manually

If using MBSA is not suitable, a more cumbersome approach is available. In the Start menu, Settings -> Control Panel -> Add/Remove Programs shows a list of all software installed, including hotfixes. Compare this list to the list of currently available updates on the Microsoft website.

Unix

Linux

Solaris

List installed patches: pkginfo -i or patchadd -p
Compare against list of current patches on Sunsolve.

To view Sun Alert Notifications for Solaris, it is necessary to use the search engineat Sunsolve: Solaris 8 Solaris 9 Solaris 10

AIX

AIX 5 provides the compare_report command, which lists the available updates from Fix Central.

For a manual check against the list of critical fixes, use:

HP-UX

List installed software: swlist -R (or, not as comprehensive: swlist -l fileset).
Patches are marked with PHCO or PHSS.

RedHat

RedHat provides the up2date utility to list available patches: up2date -l

For manual inspection, a list of current security fixes is provided for the various releases: RedHat Security Updates


Secure versions of popular software

The following table provides hints to which version of various server tools should at least be installed.

Unix

Software recommended version (and above)
Openssh
openssl
openvpn
sudo 1.6.8p10

Windows

Software Recommended service pack Important Patches
Windows 2000 SP4
Windows XP SP2
Windows 2003 SP1
Citrix Metaframe
SQL-Server