Security Updates give the most recent protection content for Norton Internet Security, which protect networked critical systems and remote and mobile users from unwanted network intrusions and hackers, as well as from viruses, Trojans, and worms.
To download and install the Security Update 599 you need to run LiveUpdate feature of Norton Internet Security product. Please note that LiveUpdate definition identifier of Security Update 599 is 20120425.001 and its description was last modified on April 25, 2012 4:11:15 PM PDT.
Security Update 599 adds coverage for the following vulnerabilities and threats:
- Web Attack: Malicious Toolkit Website 17:
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. - Web Attack: Malicious Java Download 9:
This signature detects an attempt to detect vulnerability in Java which may result in remote code execution.
Security Update 599 provides updated coverage for the following vulnerabilities and threats:
- Web Attack: Malicious Executable Download 2:
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. - Web Attack: Malicious Java Download 13:
This signature detects attempts to download malicious JAR files - Web Attack: Blackhole Toolkit Website 14:
This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities. - Web Attack: Mass Injection Website:
It is an attack where an iframe which points to a malicious site is injected in large number of clean websites. - Web Attack: Adobe Flash CVE-2012-0754:
This signature detects attempts to exploit a remote code execution vulnerability in Adobe Flash Player. - Web Attack: Malicious JAR File Download 9:
This signature detects attempts to download malicious JAR files. - Web Attack: Malicious Java Download 6:
This signature detects an attempt to detect vulnerability in Java which may result in remote code execution. - Web Attack: Malicious Toolkit Website 14:
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. - Attack: Microsoft Windows Office Assembly CVE-2012-0013:
Microsoft Windows is prone to a remote code-execution vulnerability. An attacker can exploit this issue by tricking an unsuspecting victim into viewing a malformed file. Successful exploits can allow attackers to execute arbitrary code within the privileges of the user running the affected application. Note: This issue can also be exploited by embedding other file types such as Python ('.py') or '.jar' files, if the correct interpreter is installed on the vulnerable computer.
www.symantec.com
0 comments: (+add yours?)
Post a Comment
Note: Only a member of this blog may post a comment.