Check Point Advisories

Integrity Clientless Security (ICS) Update 3.7.249.0

Check Point Reference: CPAI-2008-190
Date Published: 18 Dec 2008
Severity: Medium
Last Updated: Tuesday 01 January, 2008
Source: SmartDefense Research Center
Protection Provided by:
Who is Vulnerable? Microsoft Windows clients
Vulnerability Description Check Point Integrity ™ Clientless Security (ICS) protects your Web site by detecting and disabling spyware processes and allowing you to enforce security policies before a user logs onto your network. Using ICS you can prevent users with potentially harmful software from accessing your Web site, and also require that they conform to your antivirus and critical patch policies.

Integrity Clientless Security requires no pre-installed software on endpoint computers, except a supported browser. The scan is performed by an ActiveX component deployed from your Web server to each endpoint computer that requests access.

68 new malware signatures were added to ICS version 3.7.249.0. For a full list of the added malware, refer to the Details tab.
Vulnerability DetailsICS Update 3.7.249.0 includes 68 new malware patterns:

Win32.Adware.MyWebS.A.60.C
Win32.Adware.NaviPromo.Gen.2.259
Win32.Adware.WildTangent.C 
Win32.Backdoor.Bifrose.xml 
Win32.Backdoor.Cakl.s  
Win32.Backdoor.Delf.mpy 
Win32.Backdoor.Flux.Y 
Win32.Backdoor.Frauder.ol 
Win32.Backdoor.Hupigon.asif 
Win32.Backdoor.Hupigon.bftd 
Win32.Backdoor.Hupigon.dck  
Win32.Backdoor.PcClient.edh 
Win32.Backdoor.PcClient.icl 
Win32.Backdoor.PoisonIvy.BH 
Win32.Backdoor.Server.Delf.aki.9 
Win32.Backdoor.Server.Oderoor.EJ.5 
Win32.Downloader.Agent.bqq  
Win32.Downloader.Zlob.aalj  
Win32.qmzsjy  
Win32.rapidooutdoor   
Win32.Spy.Agent.NJB  
Win32.Spyware.PortScan.S 
Win32.sxtcy.cn  
Win32.Trojan.Agent.454656  
Win32.Trojan.Agent.6938.A  
Win32.Trojan.Boaxxe.K.54 
Win32.Trojan.Crypt.Delf.AG.15 
Win32.Trojan.Downloader.Agent.amom 
Win32.Trojan.Downloader.Agent.amoz 
Win32.Trojan.Downloader.Agent.ngg 
Win32.Trojan.Downloader.Agent.uro 
Win32.Trojan.Downloader.Agent.urt 
Win32.Trojan.Downloader.BHOSta.be 
Win32.Trojan.Downloader.Exchanger.agr 
Win32.Trojan.Downloader.Exchanger.NC 
Win32.Trojan.Downloader.FakeAlert.AQ 
Win32.Trojan.Downloader.FraudLoad.vdcu 
Win32.Trojan.Downloader.Obfuscated.ebj 
Win32.Trojan.Downloader.RtkDL.fd 
Win32.Trojan.Downloader.Small.cwk 
Win32.Trojan.Downloader.Suurch.FC 
Win32.Trojan.Downloader.VB.bsa 
Win32.Trojan.Downloader.Zlob.abhy 
Win32.Trojan.Dropper.Agent.ybe  
Win32.Trojan.Dropper.IRC.TKB.311
Win32.

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK