Norton Internet Security logo

Security Update 503 for Norton Internet Security

Nov 30, 2011

Security Updates give the most recent protection content for Norton Internet Security, which protect networked critical systems and remote and mobile users from unwanted network intrusions and hackers, as well as from viruses, Trojans, and worms.

To download and install the Security Update 503 you need to run LiveUpdate feature of Norton Internet Security product. Please note that LiveUpdate definition identifier of Security Update 503 is 20111129.030 and its description was last modified on November 29, 2011 5:03:15 PM PST.

Security Update 503 adds coverage for the following vulnerabilities and threats:

  • Web Attack: Blackhole Toolkit Website 12:
    This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Malicious Injected Javascript 10:
    This signature detects attempts to exploit machine through malicious JavaScript.

  • Web Attack: Facebook LikeJacking Attack 29:
    This signature will detect malicious web pages which are used for facebook likejacking attacks.

  • Attack: Rhino Script CVE-2011-3544:
    This signature detects attempts to exploit Rhino Script Engine Remote Code Execution Vulnerability.


Security Update 503 provides updated coverage for the following vulnerabilities and threats:
  • Web Attack: Eleonore Executable Download:
    This signature detects attempts to download exploits from a Eleonore toolkit which may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Malicious Toolkit Website 7:
    This signature generically detects an attempt to exploit a buffer overflow vulnerability either in a browser or in an ActiveX control.

  • Web Attack: Malicious PDF File Download:
    This signature will detect attempts to download malicious PDF files which can perform various harmful activities on user's systems.

  • Web Attack: Acrobat PDF Suspicious File Download 8:
    This signature detects downloads of Adobe PDF files containing malicious content.

  • Fake App Attack: Fake AV Redirect 13:
    A Web based attack relating to misleading applications has been blocked. No further action is required, but you may wish to update your virus definitions and run a full system scan as a precautionary measure.

  • Web Attack: Blackhole Exploit Kit Website 8:
    This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.

  • Fake App Attack: Fake AV Redirect 21:
    A Web based attack relating to misleading applications has been blocked. No further action is required, but you may wish to update your virus definitions and run a full system scan as a precautionary measure.

  • Web Attack: Malicious SWF File Download:
    This signature detects an attempt to exploit a vulnerability in Adobe Flash Player which may result in remote code execution.

  • System Infected: Malicious File Download Request:
    This signature will detect attempt to download malicious files through HTTP requests.

  • Web Attack: Malicious File Download Request 10:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Adobe Flash CVE-2011-2140:
    This signature detects a buffer overflow vulnerability in Adobe Flash Player.

  • Web Attack: Blackhole Exploit Kit Website 11:
    This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.


Security Update 503 removes coverage for the following vulnerabilities and threats:
  • Web Attack: HTTP MS IE Malf. IFRAME/EMBED CVE-2004-1050:
    Microsoft Internet Explorer is reported prone to a remote buffer overflow vulnerability. This issue presents itself due to insufficient boundary checks performed by the application and results in arbitrary code execution or a denial of service.

  • Web Attack: Phoenix Toolkit Download:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.


Symantec Corporation
www.symantec.com

0 comments: (+add yours?)

Post a Comment

Note: Only a member of this blog may post a comment.