Check Point Reference: | CPAI-2007-080 |
Date Published: | 19 Jul 2007 |
Severity: | Medium |
Last Updated: | Monday 01 January, 2007 |
Source: | SmartDefense Research Center |
Protection Provided by: | |
Who is Vulnerable? | Microsoft Windows clients |
Vulnerability Description | Check Point Integrity ™ Clientless Security (ICS) protects your Web site by detecting and disabling spyware processes and allowing you to enforce security policies before a user logs onto your network. Using ICS you can prevent users with potentially harmful software from accessing your Web site, and also require that they conform to your antivirus and critical patch policies. Integrity Clientless Security requires no pre-installed software on endpoint computers, except a supported browser. The scan is performed by an ActiveX component deployed from your Web server to each endpoint computer that requests access. 108 new malware signatures were added to ICS version 3.7.166.0. For a full list of the added malware, refer to the Details tab. |
Vulnerability Details | ICS Update 3.7.166.0 includes 108 new malware patterns: Actual Invisible Keylogger Win32.Backdoor.Delf.tp Win32.Backdoor.Hupigon.aan Win32.Backdoor.Hupigon.adb Win32.Backdoor.Hupigon.auj Win32.Backdoor.Hupigon.avb Win32.Backdoor.Hupigon.bke Win32.Backdoor.Hupigon.bmp Win32.Backdoor.Hupigon.bpv Win32.Backdoor.Hupigon.caa Win32.Backdoor.Rbot.ama Win32.Backdoor.Rbot.amh Win32.Backdoor.Rbot.amm Win32.Backdoor.Rbot.anc Win32.Backdoor.Rbot.aor Win32.Backdoor.Rbot.aox Win32.Backdoor.Rbot.apj Win32.Backdoor.Rbot.apq Win32.Backdoor.Rbot.asn Win32.Backdoor.Rbot.ava Win32.Backdoor.Rbot.axh Win32.Backdoor.Rbot.ayi Win32.Backdoor.Rbot.azc Win32.Backdoor.Rbot.azn Win32.Backdoor.Rbot.azr Win32.Backdoor.Rbot.fx Win32.Backdoor.Rbot.ga Win32.Backdoor.Rbot.gi Win32.Backdoor.Rbot.go Win32.Backdoor.Rbot.gv Win32.Backdoor.Rbot.ns Win32.Backdoor.SdBot.ala Win32.Email.Worm.Warezov.pa Win32.Pigeon.46 Win32.sllserv Win32.Trojan.Agent.akv Win32.Trojan.Agent.dt Win32.Trojan.Agent.gc Win32.Trojan.Agent.ha Win32.Trojan.Agent.hh Win32.Trojan.Agent.iv Win32.Trojan.Agent.mu Win32.Trojan.Agent.of Win32.Trojan.Clicker.Agent.ac Win32.Trojan.Clicker.Agent.ek Win32.Trojan.Clicker.Small.jx Win32.Trojan.DDoS.Small.h Win32.Trojan.Downloader.Adload.aa Win32.Trojan.Downloader.Adload.g Win32.Trojan.Downloader.Agent.bjo Win32.Trojan.Downloader.Agent.j Win32.Trojan.Downloader.Agent.rm Win32.Trojan.Downloader.Agent.xq Win32.Trojan.Downloader.Agent.yu Win32.Trojan.Downloader.Agent.zl Win32.Trojan.Downloader.Agent.zm Win32.Trojan.Downloader.Murlo.ct Win32.Trojan.Downloader.Small.amb Win32.Trojan.Downloader.Small.anu Win32.Trojan.Downloader.Small.awy Win32.Trojan.Downloader.Small.bqk Win32.Trojan.Downloader.Small.cem Win32.Trojan.Downloader.Small.cfd Win32.Trojan.Downloader.Small.chc Win32.Trojan.Downloader.Sm |