Check Point Advisories

Integrity Clientless Security (ICS) Update 3.7.142.0

Check Point Reference: CPAI-2007-025
Date Published: 1 Mar 2007
Severity: Medium
Last Updated: Thursday 26 April, 2007
Source: SmartDefense Research Center
Protection Provided by:
Who is Vulnerable? Microsoft Windows clients
Vulnerability Description Check Point Integrity ™ Clientless Security (ICS) protects your Web site by detecting and disabling spyware processes and allowing you to enforce security policies before a user logs onto your network. Using ICS you can prevent users with potentially harmful software from accessing your Web site, and also require that they conform to your antivirus and critical patch policies.

Integrity Clientless Security requires no pre-installed software on endpoint computers, except a supported browser. The scan is performed by an ActiveX component deployed from your Web server to each endpoint computer that requests access.
 
59 new malware signatures were added to ICS version 3.7.142.0. For a full list of the added malware, refer to the Details tab.
Vulnerability Details ICS Update 3.7.142.0 includes 59 new malware patterns:

 Win32.Adware.BDE
 Win32.Adware.Casino.5
 Win32.Adware.Casino.9
 Win32.Backdoor.Bifrose.hq
 Win32.Backdoor.Bifrose.ku
 Win32.Backdoor.Bifrose.ly
 Win32.Backdoor.Bifrose.no
 Win32.Backdoor.Bifrose.pp
 Win32.Backdoor.Bifrose.ps
 Win32.Backdoor.Bifrose.qk
 Win32.Backdoor.Bifrose.qn
 Win32.Backdoor.BO2K.112
 Win32.BackDoor.CYL
 Win32.Backdoor.Hupigon.bde
 Win32.Backdoor.Prorat.14
 Win32.Backdoor.Rbot.adj
 Win32.Backdoor.VB.rm
 Win32.Downloader.AAP
 Win32.Downloader.ACS
 Win32.Edipole
 Win32.Email.Worm.Bagle.fo
 Win32.Email.Worm.Bagle.ft
 Win32.Email.Worm.Bagle.fu
 Win32.Email.Worm.Sober.x
 Win32.Email.Worm.Zhelatin.ac
 Win32.Email.Worm.Zhelatin.u
 Win32.ettmeztf
 Win32.IWantSearch
 Win32.Matcash
 Win32.Nurb scr ping
 Win32.Porn.Dialer.InstantAccess.l
 Win32.PWS.WoW.sys
 Win32.Rootkit.PigSearch
 Win32.sta1                   
 Win32.taskmrg  
 Win32.Trojan.Bancos.ab
 Win32.Trojan.Diamin.bg
 Win32.Trojan.Downloader.Banload.alg
 Win32.Trojan.Downloader.Banload.ali
 Win32.Trojan.Downloader.Banload.bpy
 Win32.Trojan.Downloader.Banload.kv
 Win32.Trojan.Downloader.Delf.aap
 Win32.Trojan.Downloader.Delf.acx
 Win32.Trojan.Downloader.Delf.ade
 Win32.Trojan.Downloader.Delf.adf
 Win32.Trojan.Downloader.Delf.aef
 Win32.Trojan.Downloader.Delf.ams
 Win32.Trojan.Downloader.Tibs.hh
 Win32.Trojan.Downloader.Zlob.545
 Win32.Trojan.Downloader.Zlob.fn
 Win32.Trojan.Proxy.Horst.az
 Win32.Trojan.PSW.PVSteal

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK