Norton Internet Security logo

Security Update 423 for Norton Internet Security

Jul 30, 2011

Security Updates give the most recent protection content for NIS product, which protect networked critical systems and remote and mobile users from unwanted network intrusions and hackers, as well as from viruses, Trojans, and worms.

To download and install the Security Update 423 you need to run LiveUpdate feature of Norton Internet Security product. Please note that LiveUpdate definition identifier of Security Update 423 is 20110729.030 and its description was last modified on July 29, 2011 3:27:26 PM PDT.

Security Update 423 adds coverage for the following vulnerabilities and threats:

  • System Infected: ZeroAccess Rootkit Activity 2:
    This signature detects ZeroAccess Rootkit Activity

  • Attack: SAP 2005 License Manager CVE-2009-4988:
    The signature detects attempts to exploit a buffer overflow vulnerability in SAP Business One 2005 License Manager.

  • Attack: HP OpenView Omniback CVE-2001-0311:
    This signature detects attempts to exploit a command execution vulnerability in HP OpenView Omniback application.


Security Update 423 provides updated coverage for the following vulnerabilities and threats:
  • Web Attack: Java Plugin LaunchJNLP DocBase CVE-2010-3552:
    This signature detects attempt to exploit a remote buffer overflow vulnerability in Java Plug-in for Internet Explorer.

  • Web Attack: Blackhole Toolkit Website 2:
    This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Malicious Toolkit Variant Activity 20:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Malicious Toolkit Website 9:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.

  • System Infected: Yimfoca Download Activity:
    This signature detects W32.Yimfoca requesting information from its IRC controlling server.

  • Web Attack: Blackhole Toolkit Website 7:
    This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.


Security Update 423 removes coverage for the following vulnerabilities and threats:
  • HTTP Fake Codec Download Website:
    An attempt to download a malicious file has been blocked. No further action is required, but you may wish to update your virus definitions and run a full system scan as a precautionary measure.


Symantec Corporation
www.symantec.com

0 comments: (+add yours?)

Post a Comment

Note: Only a member of this blog may post a comment.