Hi,
We are running on Endpoint Manager 2016.
This week we noticed that for all clients in our local site the last Vulnerability Scan had been almost over a week ago. Clients from other locations have still been updated regularly (every day) as scheduled.
We then found out, that two Vulnerabilies caused the vulscan to crash: MSRT-001_INTL (The Microsoft Windows Malicious Software Removal Tool) and APSB18-01_INTL (Security updates available for Flash Player)
After moving those vulnerabilities to "Do not scan", all of our clients on our local site are working fine again.
When vulscan stops, the last entries within Vulscan.log are like:
Thu, 18 Jan 2018 16:01:30 Running detection script
Thu, 18 Jan 2018 16:01:30 Checking pre-requisite...
Thu, 18 Jan 2018 16:01:30 filesDownloaded: True
Thu, 18 Jan 2018 16:01:30 AlreadyScanned: True
Thu, 18 Jan 2018 16:01:30 Checking detection... (PatchGuid: {0001c647-0000-0000-0000-000000000000}, Lang: INTL)
Thu, 18 Jan 2018 16:01:30 Clearing status...
Thu, 18 Jan 2018 16:01:30 GetLanguageId: 'INTL' ==> Language Id: 0
Thu, 18 Jan 2018 16:01:30 Patch found 116295: {0001C647-0000-0000-0000-000000000000}
Thu, 18 Jan 2018 16:01:30 RegionId '0' belongs to Lang: INTL
Thu, 18 Jan 2018 16:01:30 Missing patch found: BulletinName: APSB18-01, PatchId 116295: {0001C647-0000-0000-0000-000000000000}, Lang: INTL, regionId: 0
Thu, 18 Jan 2018 16:01:30 ----------------- DETECTION RESULT ----------------------------
Thu, 18 Jan 2018 16:01:30 FileTestResult:
Thu, 18 Jan 2018 16:01:30 C:\WINDOWS\SysWOW64\Macromed\Flash\FlashUtil32_28_0_0_137_pepper.exe
Thu, 18 Jan 2018 16:01:30 [File version expected]: 28.0.0.137
Thu, 18 Jan 2018 16:01:30 [File version found]: 0.0.-1.-1
Thu, 18 Jan 2018 16:01:30 [File test action]: [1]: Change - the file is not the correct version
or
Thu, 18 Jan 2018 15:13:22 Running detection script
Thu, 18 Jan 2018 15:13:22 Checking pre-requisite...
Thu, 18 Jan 2018 15:13:22 filesDownloaded: True
Thu, 18 Jan 2018 15:13:22 AlreadyScanned: True
Thu, 18 Jan 2018 15:13:22 Checking detection... (PatchGuid: {000053db-0000-0000-0000-000000000000}, Lang: INTL)
Thu, 18 Jan 2018 15:13:22 Clearing status...
Thu, 18 Jan 2018 15:13:22 GetLanguageId: 'INTL' ==> Language Id: 0
Thu, 18 Jan 2018 15:13:22 Patch found 21467: {000053DB-0000-0000-0000-000000000000}
Thu, 18 Jan 2018 15:13:22 RegionId '1031' belongs to Lang: INTL
Thu, 18 Jan 2018 15:13:22 Missing patch found: BulletinName: MSRT-001, PatchId 21467: {000053DB-0000-0000-0000-000000000000}, Lang: INTL, regionId: 1031
Thu, 18 Jan 2018 15:13:22 ----------------- DETECTION RESULT ----------------------------
Thu, 18 Jan 2018 15:13:22 FileTestResult:
Thu, 18 Jan 2018 15:13:22 C:\WINDOWS\system32\MRT.exe
Thu, 18 Jan 2018 15:13:22 [File version expected]: 5.56.14443.1
Thu, 18 Jan 2018 15:13:22 [File version found]: 5.55.14421.1
Thu, 18 Jan 2018 15:13:22 [File test action]: [1]: Change - the file is not the correct version
Windows System event log records an error with Event ID 1000:
Name der fehlerhaften Anwendung: vulscan.exe, Version: 10.0.1.27, Zeitstempel: 0x56be1c66
Name des fehlerhaften Moduls: TimberHlpr.dll, Version: 11.0.0.369, Zeitstempel: 0x5a305888
Ausnahmecode: 0xc0000409
Fehleroffset: 0x0002878c
ID des fehlerhaften Prozesses: 0x2080
Startzeit der fehlerhaften Anwendung: 0x01d39071735f7fa7
Pfad der fehlerhaften Anwendung: C:\Program Files (x86)\LANDesk\LDClient\vulscan.exe
Pfad des fehlerhaften Moduls: C:\Program Files (x86)\LANDesk\LDClient\timber\TimberHlpr.dll
Berichtskennung: 0b7aae09-f35e-4338-8bec-80a76b4234ef
Vollständiger Name des fehlerhaften Pakets:
Anwendungs-ID, die relativ zum fehlerhaften Paket ist:
We already deleted both vulnerabilities to let them download again overnight, but still the same.
Anyone else having trouble with those vulnerabilities or any idea why this happens just to our local clients?
Regards,
Robert