Security Updates give the most recent protection content for NIS product, which protect networked critical systems and remote and mobile users from unwanted network intrusions and hackers, as well as from viruses, Trojans, and worms.
To download and install the Security Update 417 you need to run LiveUpdate feature of Norton Internet Security product. Please note that LiveUpdate definition identifier of Security Update 417 is 20110720.031 and its description was last modified on July 20, 2011 7:03:45 PM PDT.
Security Update 417 adds coverage for the following vulnerabilities and threats:
- Web Attack: Facebook Event Invitation Scam 6:
This signature will detect known Facebook scams which lead to surveys and later gain access to the Facebook profile. - Web Attack: Adobe RoboHelper CVE-2009-3068:
This signature detects attempts to exploit a authentication bypass vulnerability in Adobe RoboHelp Server. - System Infected: Poison IVY Backdoor Activity:
This signature detects Poison IVY backdoor Trojan activity on the infected machine. - Web Attack: IIS Phone Book CVE-2000-1089:
This signature detects attempts to exploit a buffer overflow vulnerability in Microsoft Phone Book Service. - Web Attack: WebDAV Write Access Code Execution:
This signature detects attempts to upload malicious content using WebDAV.
Security Update 417 provides updated coverage for the following vulnerabilities and threats:
- Web Attack: Malicious Toolkit Website 2:
This signature detects attempt to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. - Fake App Attack: Fake AV Website 5:
A Web based attack relating to misleading applications has been blocked. No further action is required, but you may wish to update your virus definitions and run a full system scan as a precautionary measure. - Web Attack: Malicious JavaScript Download:
This signature detects attempts to exploit machine through malicious JavaScript. - Web Attack: Blackhole Toolkit Website 7:
This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities. - Web Attack: Malicious SWF File Download:
This signature detects an attempt to exploit a vulnerability in Adobe Flash Player which may result in remote code execution. - Web Attack: Apache Chunked Encoding CVE-2002-0392:
This signature detects the attempt to overflow a buffer in various servers accepting HTTP connections.
Security Update 417 removes coverage for the following vulnerabilities and threats:
- Attack: Adobe Reader TTF File CVE-2010-2883:
This signature will detect attempts to exploit a remote code execution vulnerability in Adobe Reader. - Web Attack: Misleading Application Redirect:
A Web based attack relating to misleading applications has been blocked. No further action is required, but you may wish to update your virus definitions and run a full system scan as a precautionary measure. - Fake App Attack: Fake AV Website 21:
A Web based attack relating to misleading applications has been blocked. No further action is required, but you may wish to update your virus definitions and run a full system scan as a precautionary measure.
Symantec Corporation
www.symantec.com
www.symantec.com
0 comments: (+add yours?)
Post a Comment
Note: Only a member of this blog may post a comment.