eScan BlogeScan Blog    eScan WebsiteeScan Website    eScan ForumeScan Forum    eScan FeedseScan Feeds     
    
Languages:     

From eScan Wiki

Jump to: navigation, search
Image:escan-g.jpg
· eScan  · MailScan  · Technologies   · Technical Info  · Security Awareness  · User Guides
Hotfixes for Linux products


Contents


eScan Web Management Console Command Injection

  • Release Date:
17th April 2014.
  • Technical Info:
  1. This hotfix resolves the issue of
    Command Injection vulnerability in
    eScan Web Management Console
    in module MWADMIN version 5.x.
  • How to install this hotfix?
  1. Unzip the escan_mwadmin_patch.zip. All the file will be extracted to escan_mwadmin_patch directory,.
  2. Go to escan_mwadmin_patch directory and execute the install.sh (root permission is required to execute this script)
       #./install.sh




Clam AV service in MicroWorld products for Linux does not start after updates

  • Release Date:
3rd May 2010.
  • Technical Info:
  1. This hotfix resolves the issue of CLAM AV service, in MicroWorld product for
    Linux, either stops or does not restarts after downloading the latest AV updates.
  2. This hotfix will upgrade to the latest version of CLAM AV engine in MicroWorld
    products for</br> Linux.
  3. Click here to read the Announcements




  • How to install this hotfix?
  1. Extract the mwcav_hotfix_<linux-release-version>.zip
  2. Go to extracted directory mwcav_hotfix_<linux-release-version>
  3. Run ./install.sh and patch will be applied successfully,
  4. Then update the Clam av from the Web-Administration,
  5. Restart the Clam antivirus service either from the Web-Administration or by the below command from the terminal:
/opt/MicroWorld/etc/init.d/mwcav start

Download Hotfix for:

Note:
If you do not find the hotfix for your Linux distro, write to us at linux@escanav.com
or support@escanav.com with the below details:

  1. Product Name [eScan (Desktop or File Servers) / MailScan / WebScan] and
    product version,
  2. Linux Distribution name and release version (32 bit or 64 bit),
  3. Linux kernel version.


Remote Command Execution Vulnerability in MWADMIN version <= 4.1.x

  • Release Date:
1st April 2010.
  • Technical Info:
  1. This hotfix, for the base Package - MWADMIN, resolves the Remote Command
    Execution Vulnerability issue reported in prior versions 4.1.x of MWADMIN
    package.
  2. This hotfix is required to be applied in the below products where the version
    of MWADMIN is less than 4.1.x
  • eScan for Linux Desktop
  • eScan for Linux File Servers
  • MailScan for Linux Mailservers
  • WebScan for Linux Proxy Servers
  • How to install this hotfix?
  1. Extract the es_hotfix_1.zip or the es_hotfix_1_fp.zip
    (as per the linux distributions listed below).
  2. Go to es_hotfix_1 directory (for es_hotfix_1.zip)
    OR
    es_hotfix_1_fp directory (for es_hotfix_1_fp.zip)
  3. Run ./install.sh and patch will be applied successfully.



  • Debian 5.0.3
  • Fedora Core 6
  • Fedora 8
  • Fedora 9
  • RHEL 5 (32 bit & 64 bit)
  • Slackware 12.3
  • SLES 10.2
  • SLES 11
  • Ubuntu 8.10
  • Ubuntu 9.10
  • Fedora Core 3
  • RHEL 4
  • SLES 10
  • SLES 10.2 (64 bit)







eScan Copyright © 2015 MicroWorld Technologies Inc.- AntiVirus & Content Security.       Send your feedback to solutions@escanav.com eScan Wiki

    Privacy policy  About eScan Wiki  Disclaimers   This page has been accessed 88,934 times.