Security Updates give the most recent protection content for Norton Internet Security product, which can protect computer from unwanted network intrusions and hackers, as well as from viruses, Trojans and worms.
To download and install the Security Update 371 you need to run LiveUpdate feature of Norton Internet Security product. The Security Update 371 adds coverage for the following vulnerabilities and threats:
- W32.Qakbot Activity — W32.Qakbot is a worm that spreads through network shares and opens a back door on the compromised computer. It may also steal information and download more files on to the compromised computer.
- Fake AV Redirect 19 — Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
- MS Internet Explorer Memory Corruption CVE-2011-1345 2 — A defect in object lifetime management causes Internet Explorer to release an object twice which can lead to a delayed crash or even remote code execution.
- MS Word SWF CVE-2011-0611 — Adobe Flash Player is a multimedia application for multiple platforms. Adobe Flash Player is prone to a remote memory-corruption vulnerability. Specifically, the issue is triggered when handling a malicious «.swf» file embedded in a Microsoft Word «.doc» file. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions.
Security Update 371 provides updated coverage for the following vulnerabilities and threats:
- Misleading Application File Download 2
- Phoenix Toolkit File Download 2
- HTTP Java Malicious Download Activity
- Malicious Toolkit Website 10
- HTTP Exploit Kit Variant Activity 1
- Malicious Java Activity 5
- Exploit Kit Variant Activity 4
Security Update 371 removes coverage for Fake AV Redirect 13.
0 comments: (+add yours?)
Post a Comment
Note: Only a member of this blog may post a comment.