Security Updates give the most recent protection content for NIS product, which protect networked critical systems and remote and mobile users from unwanted network intrusions and hackers, as well as from viruses, Trojans, and worms.
To download and install the Security Update 406 you need to run LiveUpdate feature of Norton Internet Security product. Please note that LiveUpdate definition identifier of Security Update 406 is 20110704.050 and its description was last modified on July 4, 2011 3:25:30 PM PDT.
Security Update 406 adds coverage for the following vulnerabilities and threats:
- Attack: VideoSpirit Pro VISPRJ CVE-2011-0499:
This signature detects attempts to a buffer overflow vulnerability in VideoSpirit Pro application.
Security Update 406 provides updated coverage for the following vulnerabilities and threats:
- Web Attack: Malicious Toolkit Request:
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. - Web Attack: Exploit Kit Variant Activity 8:
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. - Web Attack: Malicious Toolkit Variant Activity 22:
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. - Web Attack: HTTP Malicious Java Class Download Activity:
This signature detects attempts to download malicious JAR files - Web Attack: Blackhole Toolkit Website 7:
This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities. - Fake App Attack: Fake AV Website 18:
A Web based attack relating to misleading applications has been blocked. No further action is required, but you may wish to update your virus definitions and run a full system scan as a precautionary measure. - Attack: Adobe Flash Embedded SWF CVE-2011-0611:
This signature will detect attempts to exploit a remote code execution vulnerability in Microsoft Word.
Symantec Corporation
www.symantec.com
www.symantec.com
0 comments: (+add yours?)
Post a Comment
Note: Only a member of this blog may post a comment.