Norton Internet Security logo

Security Update 653 for Norton Internet Security

Jul 18, 2012

Security Updates give the most recent protection content for Norton Internet Security, which protect networked critical systems and remote and mobile users from unwanted network intrusions and hackers, as well as from viruses, Trojans, and worms.

To download and install the Security Update 653 you need to run LiveUpdate feature of Norton Internet Security product. Please note that LiveUpdate definition identifier of Security Update 653 is 20120717.003 and its description was last modified on July 17, 2012 8:39:49 PM PDT.

Security Update 653 adds coverage for the following vulnerabilities and threats:

  • System Infected: ZeroAccess Rootkit Activity 5:
    Your computer is infected - Action is recommended, see response section for further details on how to run the removal tool.

    This IPS signature is designed to detect and block the network communications initiated by Trojan.Zeroaccess to prevent the threat from receiving additional commands and further updates even when antivirus might not be able to detect the infection.


  • Web Attack: Generic Memory Heap Spray 2:
    This signature generically detects an attempt to exploit a buffer overflow vulnerability either in a browser or in an ActiveX control.

  • System Infected: W32 Ramnit Activity 2:
    A Web based attack relating to W32.Ramnit has been blocked. Opening infected page may result in compromise of the host machine. No further action is required, but you may wish to update your virus definitions and run a full system scan as a precautionary measure.


Security Update 653 provides updated coverage for the following vulnerabilities and threats:
  • Fake App Attack: Misleading Application File Download 3:
    A Web based attack relating to misleading applications has been blocked. No further action is required, but you may wish to update your virus definitions and run a full system scan as a precautionary measure.

  • Web Attack: Adobe Flash CVE-2012-0754 2:
    This signature detects attempts to exploit a remote code execution vulnerability in Adobe Flash Player.

  • Web Attack: Exploit Toolkit Website 5:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Malicious JAR File Download 11:
    This signature detects attempts to download malicious JAR files.

  • Web Attack: Blackhole Toolkit Website 22:
    This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Apple Quicktime CVE-2012-0663:
    This signature detects the stack overflow vulnerability in the Apple Quicktime versions that are prior to 7.7.2.


Symantec Corporation
www.symantec.com

0 comments: (+add yours?)

Post a Comment

Note: Only a member of this blog may post a comment.