Norton Internet Security logo

Security Update 549 for Norton Internet Security

Feb 15, 2012

Security Updates give the most recent protection content for Norton Internet Security, which protect networked critical systems and remote and mobile users from unwanted network intrusions and hackers, as well as from viruses, Trojans, and worms.

To download and install the Security Update 549 you need to run LiveUpdate feature of Norton Internet Security product. Please note that LiveUpdate definition identifier of Security Update 549 is 20120214.003 and its description was last modified on February 14, 2012 4:34:03 PM PST.

Security Update 549 adds coverage for the following vulnerabilities and threats:

  • Fake App Attack: Fake AV Redirect 31:
    A Web based attack relating to misleading applications has been blocked. No further action is required, but you may wish to update your virus definitions and run a full system scan as a precautionary measure.

  • Web Attack: Midi CVE-2012-0003:
    This signature detects a remote buffer overflow vulnerability in Windows Media Player.

  • Web Attack: Facebook Manual Share Scam:
    This signature will detect malicious web pages using manual sharing as spreading vector.

  • Web Attack: Apache Tomcat Manager CVE-2009-3548:
    This signature detects attempts to exploit a remote code execution vulnerability in Apache Tomcat.

  • Web Attack: Malicious JAR File Download 6:
    This signature detects attempts to download malicious JAR files.


Security Update 549 provides updated coverage for the following vulnerabilities and threats:
  • Web Attack: Eleonore Executable Download:
    This signature detects attempts to download exploits from a Eleonore toolkit which may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Malicious JAR File Download 2:
    This signature detects attempts to download malicious JAR files.

  • Web Attack: Malicious SWF File Download:
    This signature detects an attempt to exploit a vulnerability in Adobe Flash Player which may result in remote code execution.

  • Web Attack: Malicious File Download Request 10:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Malicious Executable Download 2:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Blackhole Exploit Kit Website 11:
    This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Facebook LikeJacking Attack 23:
    This signature will detect malicious web pages which are used for facebook likejacking attacks.

  • Web Attack: Exploit Website 9:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Mass Injection Website:
    It is an attack where an iframe which points to a malicious site is injected in large number of clean websites.


Symantec Corporation
www.symantec.com

0 comments: (+add yours?)

Post a Comment

Note: Only a member of this blog may post a comment.