Check Point Advisories

Integrity Clientless Security (ICS) Update 3.7.166.0

Check Point Reference: CPAI-2007-080
Date Published: 19 Jul 2007
Severity: Medium
Last Updated: Monday 01 January, 2007
Source: SmartDefense Research Center
Protection Provided by:
Who is Vulnerable? Microsoft Windows clients
Vulnerability Description Check Point Integrity ™ Clientless Security (ICS) protects your Web site by detecting and disabling spyware processes and allowing you to enforce security policies before a user logs onto your network. Using ICS you can prevent users with potentially harmful software from accessing your Web site, and also require that they conform to your antivirus and critical patch policies.

Integrity Clientless Security requires no pre-installed software on endpoint computers, except a supported browser. The scan is performed by an ActiveX component deployed from your Web server to each endpoint computer that requests access.
 
108 new malware signatures were added to ICS version 3.7.166.0. For a full list of the added malware, refer to the Details tab.
Vulnerability DetailsICS Update 3.7.166.0 includes 108 new malware patterns:

Actual Invisible Keylogger
Win32.Backdoor.Delf.tp
Win32.Backdoor.Hupigon.aan
Win32.Backdoor.Hupigon.adb
Win32.Backdoor.Hupigon.auj
Win32.Backdoor.Hupigon.avb
Win32.Backdoor.Hupigon.bke
Win32.Backdoor.Hupigon.bmp
Win32.Backdoor.Hupigon.bpv
Win32.Backdoor.Hupigon.caa
Win32.Backdoor.Rbot.ama
Win32.Backdoor.Rbot.amh
Win32.Backdoor.Rbot.amm
Win32.Backdoor.Rbot.anc
Win32.Backdoor.Rbot.aor
Win32.Backdoor.Rbot.aox
Win32.Backdoor.Rbot.apj
Win32.Backdoor.Rbot.apq
Win32.Backdoor.Rbot.asn
Win32.Backdoor.Rbot.ava
Win32.Backdoor.Rbot.axh
Win32.Backdoor.Rbot.ayi
Win32.Backdoor.Rbot.azc
Win32.Backdoor.Rbot.azn
Win32.Backdoor.Rbot.azr
Win32.Backdoor.Rbot.fx
Win32.Backdoor.Rbot.ga
Win32.Backdoor.Rbot.gi
Win32.Backdoor.Rbot.go
Win32.Backdoor.Rbot.gv
Win32.Backdoor.Rbot.ns
Win32.Backdoor.SdBot.ala
Win32.Email.Worm.Warezov.pa
Win32.Pigeon.46
Win32.sllserv
Win32.Trojan.Agent.akv
Win32.Trojan.Agent.dt
Win32.Trojan.Agent.gc
Win32.Trojan.Agent.ha
Win32.Trojan.Agent.hh
Win32.Trojan.Agent.iv
Win32.Trojan.Agent.mu
Win32.Trojan.Agent.of
Win32.Trojan.Clicker.Agent.ac
Win32.Trojan.Clicker.Agent.ek
Win32.Trojan.Clicker.Small.jx
Win32.Trojan.DDoS.Small.h
Win32.Trojan.Downloader.Adload.aa
Win32.Trojan.Downloader.Adload.g
Win32.Trojan.Downloader.Agent.bjo
Win32.Trojan.Downloader.Agent.j
Win32.Trojan.Downloader.Agent.rm
Win32.Trojan.Downloader.Agent.xq
Win32.Trojan.Downloader.Agent.yu
Win32.Trojan.Downloader.Agent.zl
Win32.Trojan.Downloader.Agent.zm
Win32.Trojan.Downloader.Murlo.ct
Win32.Trojan.Downloader.Small.amb
Win32.Trojan.Downloader.Small.anu
Win32.Trojan.Downloader.Small.awy
Win32.Trojan.Downloader.Small.bqk
Win32.Trojan.Downloader.Small.cem
Win32.Trojan.Downloader.Small.cfd
Win32.Trojan.Downloader.Small.chc
Win32.Trojan.Downloader.Sm

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK