Check Point Advisories

Integrity Clientless Security (ICS) Update 3.7.231.0

Check Point Reference: CPAI-2008-083
Date Published: 16 Jun 2008
Severity: Medium
Last Updated: Tuesday 01 January, 2008
Source: SmartDefense Research Center
Protection Provided by:
Who is Vulnerable? Microsoft Windows clients
Vulnerability Description Check Point Integrity ™ Clientless Security (ICS) protects your Web site by detecting and disabling spyware processes and allowing you to enforce security policies before a user logs onto your network. Using ICS you can prevent users with potentially harmful software from accessing your Web site, and also require that they conform to your antivirus and critical patch policies.

Integrity Clientless Security requires no pre-installed software on endpoint computers, except a supported browser. The scan is performed by an ActiveX component deployed from your Web server to each endpoint computer that requests access.

88 new malware signatures were added to ICS version 3.7.231.0. For a full list of the added malware, refer to the Details tab.
Vulnerability DetailsICS Update 3.7.231.0 includes 88 new malware patterns:

 Win32.Adware.ADSTechno.A.1
 Win32.Adware.Agent.40960.E
 Win32.AdWare.BHO.ar
 Win32.Adware.Casino.AA.2
 Win32.Adware.NavHelper
 Win32.Adware.PigSearch.D
 Win32.Adware.Superjuan.bgi
 Win32.Adware.Virtumonde.qxn
 Win32.Adware.Virtumonde.trz
 Win32.Adware.WSB.b
 Win32.Application.Freejoiner.A
 Win32.Backdoor.Agent.ejx
 Win32.Backdoor.Bifrose.cnx
 Win32.Backdoor.Bot.16127
 Win32.BackDoor.Generic.1484
 Win32.Backdoor.Generic.49825
 Win32.Backdoor.Popwin.aws
 Win32.Backdoor.Server.Bifrose.ZXE.99
 Win32.Backdoor.Server.Poisonivy.J.23
 Win32.Backdoor.Turkojan.jv
 Win32.Dialer.Generic.20069
 Win32.Downloader.Agent.dpc
 Win32.Downloader.Agent.SUJ
 Win32.Downloader.Banload.mam
 Win32.Downloader.Zlob.lps.2
 Win32.Exploit.Agent.bo
 Win32.Generic.Malware.P.Yd.dldPk
 Win32.PcMir
 Win32.Rootkit.Agent.DU
 Win32.Spyware.Tool.Downlo.P.1
 Win32.Super_Kill
 Win32.Trojan.Agent.1024.230
 Win32.Trojan.Agent.1024.269
 Win32.Trojan.Agent.14880.15
 Win32.Trojan.Agent.24096.10
 Win32.Trojan.Agent.3798
 Win32.Trojan.Agent.4096.212
 Win32.Trojan.Agent.45056.138
 Win32.Trojan.Agent.49152.125
 Win32.Trojan.Crypt.Delf.G.20
 Win32.Trojan.Delf.HX.2
 Win32.Trojan.Delf.Inject.S.56
 Win32.Trojan.Delf.Inject.S.69
 Win32.Trojan.Delf.Inject.Z
 Win32.Trojan.Downloader.Banload.zc
 Win32.Trojan.Dropper.Agent.40448
 Win32.Trojan.Dropper.Agent.qpi.1
 Win32.Trojan.Dropper.Cutwail.O.10
 Win32.Trojan.Dropper.VB.A.

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK