Check Point Advisories

Integrity Clientless Security (ICS) Update 3.7.211.0

Check Point Reference: CPAI-2008-034
Date Published: 28 Feb 2008
Severity: Medium
Last Updated: Tuesday 01 January, 2008
Source: SmartDefense Research Center
Protection Provided by:
Who is Vulnerable? Microsoft Windows clients
Vulnerability Description Check Point Integrity ™ Clientless Security (ICS) protects your Web site by detecting and disabling spyware processes and allowing you to enforce security policies before a user logs onto your network. Using ICS you can prevent users with potentially harmful software from accessing your Web site, and also require that they conform to your antivirus and critical patch policies.

Integrity Clientless Security requires no pre-installed software on endpoint computers, except a supported browser. The scan is performed by an ActiveX component deployed from your Web server to each endpoint computer that requests access.

140 new malware signatures were added to ICS version 3.7.211.0. For a full list of the added malware, refer to the Details tab.
Vulnerability DetailsICS Update 3.7.211.0 includes 140 new malware patterns:

 Win32.Adware.AdAgent.k
 Win32.Adware.Agent.du
 Win32.Adware.Fakealert.53
 Win32.Adware.Gdown
 Win32.Adware.Generic.6279
 Win32.Adware.PeerNet
 Win32.AdWare.ToolBar.EliteBar.am
 Win32.agetltfets
 Win32.aGQABNWGI
 Win32.Application.Aseye.PN
 Win32.Application.Generic.1317
 Win32.Application.Spyware.Snoopst.C
 Win32.Backdoor.Aimbot.eh          
 Win32.Backdoor.Beizhu.277
 Win32.Backdoor.Bifrose.aeh
 Win32.Backdoor.Bifrose.cag
 Win32.Backdoor.Bifrose.ZTH
 Win32.Backdoor.Bifrost.515
 Win32.Backdoor.Ceckno.nc
 Win32.Backdoor.Farfli.K
 Win32.Backdoor.Generic.25581
 Win32.Backdoor.Graybird.CEA
 Win32.Backdoor.HackDef
 Win32.Backdoor.Hupigon.uiy
 Win32.Backdoor.Hupigon.ZKN
 Win32.Backdoor.IRC.ZFF
 Win32.Backdoor.IRCBot.ABJM
 Win32.Backdoor.Pigeon.BPY
 Win32.Backdoor.ProRat.TF
 Win32.Backdoor.Protux.g
 Win32.Backdoor.SdBot.cge
 Win32.Backdoor.SDBot.DFFF
 Win32.Backdoor.Shark.aa
 Win32.Backdoor.Shark.AN
 Win32.Backdoor.Shark.AO
 Win32.Backdoor.Shark.mq
 Win32.Backdoor.Sinowal.e
 Win32.Backdoor.VB.Shark
 Win32.BackDoor.Winsta
 Win32.Delf.CSN
 Win32.dljlu
 Win32.Downloader.Small.eoi
 Win32.Dropper.Agent.dxz
 Win32.Dropper.Delf.agt
 Win32.Email.Worm.Monikey.a
 Win32.Email.Worm.Monikey.b
 Win32.Email.Worm.VB.ee
 Win32.Exploit.CodeBase
 Win32.Generic.Malware.G.IFMYdg
 Win32.Generic.Malware.G.SI.FWX.Bg
 Win32.Generic.Malware.MPVPkWk
 Win32.Generic.Malware.P.dldPk
 Win32.Generic.Malware.P.Pk
 Win32.Generic.Malware.SFYBdld
 Win32.Gen

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK