Check Point Advisories

Integrity Clientless Security (ICS) Update 3.7.131.0

Check Point Reference: CPAI-2007-010
Date Published: 25 Jan 2007
Severity: Medium
Last Updated: Monday 30 April, 2007
Source: SmartDefense Research Center
Protection Provided by:
Who is Vulnerable? Microsoft Windows clients
Vulnerability Description Check Point Integrity ™ Clientless Security (ICS) protects your Web site by detecting and disabling spyware processes and allowing you to enforce security policies before a user logs onto your network. Using ICS you can prevent users with potentially harmful software from accessing your Web site, and also require that they conform to your antivirus and critical patch policies.

Integrity Clientless Security requires no pre-installed software on endpoint computers, except a supported browser. The scan is performed by an ActiveX component deployed from your Web server to each endpoint computer that requests access.
 
64 new malware signatures were added to ICS version 3.7.131.0. For a full list of the added malware, refer to the Details tab.
Vulnerability Details ICS Update 3.7.131.0 includes 64 new malware patterns:

 Win32.Backdoor.Agent.tl
 Win32.Backdoor.Backage.31
 Win32.Backdoor.Ciadoor.122.a
 Win32.Backdoor.Delf.dl
 Win32.Backdoor.Dimbus.10
 Win32.Backdoor.Haxdoor.e
 Win32.Backdoor.Haxdoor.l
 Win32.Backdoor.Hupigon.ctw
 Win32.Backdoor.Hupigon.dfr
 Win32.Backdoor.Prorat.dz
 Win32.Backdoor.Sensode.b
 Win32.Backdoor.SilentSpy.210
 Win32.Backdoor.Snakdor.10
 Win32.Backdoor.Snid.X2.12
 Win32.Backdoor.SubSeven.22.b2
 Win32.Backdoor.VBbot.bf
 Win32.clcbt
 Win32.DoS.Daily
 Win32.DoS.Fortune.24
 Win32.DownLoader.9737
 Win32.Email.Flooder.Avril
 Win32.IM.Flooder.Delf.h
 Win32.Ineb
 Win32.NGOGO04
 Win32.Pigeon.36
 Win32.Porn.Dialer.AdultBrowser
 Win32.PWS.Bancos
 Win32.Trojan.Agent.bd
 Win32.Trojan.Agent.za
 Win32.Trojan.Clicker.Costrat.ad
 Win32.Trojan.Clicker.Costrat.s
 Win32.Trojan.Dialer.gu
 Win32.Trojan.Downloader.Agent.bef
 Win32.Trojan.Downloader.Banload.aht
 Win32.Trojan.Downloader.Banload.ap
 Win32.Trojan.Downloader.Banload.aqo
 Win32.Trojan.Downloader.Banload.awz
 Win32.Trojan.Downloader.Banload.bpv
 Win32.Trojan.Downloader.Banload.kh
 Win32.Trojan.Downloader.Banload.rd
 Win32.Trojan.Downloader.Delf.apx
 Win32.Trojan.Downloader.Small.ctp
 Win32.Trojan.Downloader.Small.ddy
 Win32.Trojan.Downloader.Tiny.bm334296
 Win32.Trojan.Downloader.Tiny.bm344546
 Win32.Trojan.Downloader.VB.ahn
 Win32.Trojan.Dropper.Calimocho
 Win32.Trojan.Dropper.Delf.aah
 Win32.Trojan.Dropper.Delf.s
 Win32.Trojan.Dropper.Joiner.g
 Win32.Trojan.Dropper.Small.j
 Win32.Trojan.Hotkey
 Win32.Trojan.Proxy.Lager.ch
&n

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK