Check Point Advisories

Integrity Clientless Security (ICS) Update 3.7.59.0

Check Point Reference: CPAI-2006-009
Date Published: 9 Feb 2006
Severity: Medium
Last Updated: Tuesday 08 May, 2007
Source: SmartDefense Research Center
Protection Provided by:
Who is Vulnerable? Microsoft Windows clients 
Vulnerability Description Check Point Integrity ™ Clientless Security (ICS) for Connectra prevents users with potentially harmful software from accessing your network and requires that they conform to the organization?s antivirus and firewall policies. For more information, please refer to Connectra documentation and to ICS administration Guide. 

77 new malware signatures were added to ICS version 3.7.59.0. For a full list of the added malware, refer to the Details section below (SmarDefense Services subscription required). 
Vulnerability Details

     Malware signatures added to ICS version 3.7.59.0:
     Win32.RBot.aih
     Win32.Rbot.gep
     Win32.WExplorer
     Win32.Banker.dhy
     Net.Worm.Win32.Bobic.k2
     Win32.Scorti
     Win32.Backdoor.Virtue
     Win32.Banker.abg
     Net.Worm.Win32.Bobic.k
     Win32.IRCbot.wov
     Win32.w197
     Win32.Trojan.PSW.Lmir.no
     Win32.Bancos.haa
     Win32.Isass
     MessengerPluss
     Virus.Win32.Parite.ba
     Win32.Notifier.DLL
     Trojan.Dropper.Win32.Paradrop.a
     Win32.Inject.i
     Win32.Banker.chy
     begin2search
     Win32.SpooIsv
     Win32.Nimda
     Win32.KillAV
     Win32.Nyxem.e
     Win32.WNFirewall
     Win32.Backdoor.ASP
     Win32.Njuvs
     Win32.drvsys
     Win32.Rbot.geo
     Win32.Tilebot-CH
     Win32.Banker.bhy
     Win32.Downloader-FL
     Win32.svcdata
     Win32.Banker.ehy
     Trojan.Dropper.Win32.Paradrop.a4
     Win32.xanax
     Win32.Rbot.ger
     Win32.Start.1
     Parche Dragonbot
     Win32.IRCBot.exp
     W32.Scrambler
     Win32

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK