Check Point Reference: | CPAI-2008-072 |
Date Published: | 20 May 2008 |
Severity: | Medium |
Last Updated: | Tuesday 01 January, 2008 |
Source: | SmartDefense Research Center |
Protection Provided by: | |
Who is Vulnerable? | Microsoft Windows clients |
Vulnerability Description | Check Point Integrity ™ Clientless Security (ICS) protects your Web site by detecting and disabling spyware processes and allowing you to enforce security policies before a user logs onto your network. Using ICS you can prevent users with potentially harmful software from accessing your Web site, and also require that they conform to your antivirus and critical patch policies. Integrity Clientless Security requires no pre-installed software on endpoint computers, except a supported browser. The scan is performed by an ActiveX component deployed from your Web server to each endpoint computer that requests access. 31 new malware signatures were added to ICS version 3.7.223.0. For a full list of the added malware, refer to the Details tab. |
Vulnerability Details | ICS Update 3.7.223.0 includes 31 new malware patterns: Win32.Application.Prockill.T Win32.Backdoor.Agent.ckt Win32.Backdoor.Bifrose.eco Win32.Backdoor.Ceckno.ml Win32.Backdoor.IRC.Shabot Win32.Backdoor.RBot.XQU Win32.Backdoor.Shell.R Win32.Delf.AJN Win32.Generic.Malware.FP Win32.IM.Worm.AutoIt.d Win32.IRC.Worm.Momma Win32.jccrkx Win32.Packer.Malware.NSAnti.W Win32.svcjogg Win32.Trojan.Cexe Win32.Trojan.Delf.bbp Win32.Trojan.Delf.Inject.F Win32.Trojan.Dropper.Agent.agi Win32.Trojan.Dropper.Mixus Win32.Trojan.Dropper.Small.awg Win32.Trojan.Generic.74723 Win32.Trojan.Generic.80544 Win32.Trojan.Horse.NRV Win32.Trojan.SdBot.2815 Win32.Trojan.Spy.Bancos.uh Win32.Trojan.Spy.Banker.bih Win32.Trojan.Spy.Keylogger.12 Win32.Trojan.Spy.VB.NDT Win32.Worm.Autorun.VB.N Win32.Worm.Bagz.D.unp Win32.Worm.IM.G |