Norton Internet Security logo

Security Update 408 for Norton Internet Security

Jul 8, 2011

Security Updates give the most recent protection content for NIS product, which protect networked critical systems and remote and mobile users from unwanted network intrusions and hackers, as well as from viruses, Trojans, and worms.

To download and install the Security Update 408 you need to run LiveUpdate feature of Norton Internet Security product. Please note that LiveUpdate definition identifier of Security Update 408 is 20110707.031 and its description was last modified on July 7, 2011 8:00:38 PM PDT.

Security Update 408 adds coverage for the following vulnerabilities and threats:

  • Attack: Scada Control MicroSystems ClearScada DOS:
    This signature detects Denial of Service attempts by sending specially crafted packet.

  • Web Attack: RealPlayer ActiveX CCDA:
    This signature detects attempts to exploit a remote code execution vulnerability in RealPlayer.

  • Attack: MS PowerPoint TimeColorBehaviorContainer Record CVE-2011-0655:
    This signature detects attempt to a remote code execution vulnerability in Microsoft PowerPoint application.

  • HeapCreate Targeting ROP Attack:
    This signature detects an attempt to exploit the browser using a exploitation technique known as Return Oriented Programming.


Security Update 408 provides updated coverage for the following vulnerabilities and threats:
  • Web Attack: Siberia Toolkit Activity 2:
    Siberia Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.

  • Web Attack: Java Malicious Download Activity:
    This signature detects attempts to download malicious files onto the machine.

  • Web Attack: Malicious Java Activity 5:
    This signature detects attempts to download malicious JAR files

  • Web Attack: Malicious Toolkit Download Activity:
    This signature detects malicious activity on the host machine

  • Attack: Adobe Flash Embedded SWF CVE-2011-0611:
    This signature will detect attempts to exploit a remote code execution vulnerability in Microsoft Word.

  • Web Attack: Malicious SWF File Download:
    This signature detects an attempt to exploit a vulnerability in Adobe Flash Player which may result in remote code execution.

  • Attack: VideoSpirit Pro VISPRJ CVE-2011-0499:
    This signature detects attempts to a buffer overflow vulnerability in VideoSpirit Pro application.

  • Web Attack: AOL Desktop RTX:
    This Signature detects attempts to exploit buffer overflow vulnerability in AOL Desktop.


Symantec Corporation
www.symantec.com

0 comments: (+add yours?)

Post a Comment

Note: Only a member of this blog may post a comment.