Check Point Advisories

Integrity Clientless Security (ICS) Update 3.7.105.0

Check Point Reference: CPAI-2006-122
Date Published: 11 Oct 2006
Severity: Medium
Last Updated: Wednesday 02 May, 2007
Source: SmartDefense Research Center
Protection Provided by:
Who is Vulnerable? Microsoft Windows clients
Vulnerability Description Check Point Integrity ™ Clientless Security (ICS) protects your Web site by detecting and disabling spyware processes and allowing you to enforce security policies before a user logs onto your network. Using ICS you can prevent users with potentially harmful software from accessing your Web site, and also require that they conform to your antivirus and critical patch policies .

Integrity Clientless Security requires no pre-installed software on endpoint computers, except a supported browser. The scan is performed by an ActiveX component deployed from your Web server to each endpoint computer that requests access.
 
26 new malware signatures were added to ICS version 3.7.105.0. For a full list of the added malware, refer to the Details tab.
Vulnerability DetailsICS Update 3.7.105.0 includes 26 new malware patterns:

 MP3 to WAV Decoder
 Win32.AdWare.LinkOptimizer.a
 Win32.Backdoor.BO2K.10
 Win32.Backdoor.Delf.auu
 Win32.Backdoor.Rbot.wi
 Win32.DownLoader.4293
 Win32.kvess
 Win32.longshao
 Win32.PWS.Hook.dll
 Win32.Trojan.Downloader.Adload.fz
 Win32.Trojan.Downloader.Agent.ayg
 Win32.Trojan.Downloader.Agent.ayk
 Win32.Trojan.Downloader.Agent.tv
 Win32.Trojan.Downloader.Small.dtt
 Win32.Trojan.Downloader.Small.duy
 Win32.Trojan.LowZones.dt
 Win32.Trojan.Proxy.Horst.bq
 Win32.Trojan.PSW.Delf.hh
 Win32.Trojan.PSW.Delf.of
 Win32.Trojan.PSW.Delf.qr
 Win32.Trojan.PSW.Lineage.akl
 Win32.Trojan.PSW.QQPass.ms
 Win32.Trojan.PSW.WOW.jf
 Win32.Trojan.PSW.WOW.jk
 Win32.W32Pws.AOJ
 X Password Manager

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK