×

Method and system for identifying, fixing, and updating security vulnerabilities

  • US 6,907,531 B1
  • Filed: 06/30/2000
  • Issued: 06/14/2005
  • Est. Priority Date: 06/30/2000
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented process for identifying security vulnerabilities in a host computer system via a scanner comprising an engine, exploit manager, resource manager, and built-in exploits, comprising the steps of:

  • updating a capability of the scanner to conduct vulnerability assessments of the host computer system by obtaining a pluggable express update package, wherein the update package is configured as an independent plug-in module that is separate from the scanner and communicates with the scanner to support the vulnerability assessments by the scanner, the update package comprising;

    an exploit plug-in module comprising exploit objects for exploits that check the host computer system for at least certain ones of the security vulnerabilities, the exploits representing modifications or updates to the built-in exploits of the scanner;

    a resource plug-in module comprising resource objects representing resources that can be used by the scanner, the resources maintained as resource objects separate from the exploits of the exploit objects to support an independent updating of the resource objects and the exploit objects;

    a dat file comprising exploit attribute information defining attribute information for the exploits of the exploit plug-in module, the exploit attribute information stored in a file separate from the exploit objects to support an independent updating of the dat file and the exploit objects; and

    a help file comprising on-line help information about the exploits of the exploit plug-in module, the help information stored in a file separate from the exploit objects to support an independent updating of the help file and the exploit objects;

    supplying the exploit attribute information to the exploit manager from the dat file;

    passing the exploit objects and the resource objects from the exploit manager and the resource manager to an engine of the scanner; and

    executing the exploits of the exploit plug-in module at the scanner.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×