Revision as of 05:36, 8 September 2010 WikiSysop (Talk | contribs)
← Previous diff |
Current revision WikiSysop (Talk | contribs)
|
Line 1: |
Line 1: |
| {| class="wikitable" border="0" | | {| class="wikitable" border="0" |
- | | + | |- |
- | {| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | + | |
- | | style="width:56%; color:#000;" | | + | |
- | {| style="width:280px; border:none; background:none;" | + | |
- | | [[Image:Escan_wikipedia.jpg|left|<!--We add confidence to computing-->]] | + | |
- | |} | + | |
- | |width="1000pt" style="width:11%; font-size:95%;" white-space:nowrap;| | + | |
- | <B><p> General</p></B> | + | |
- | * [[Main Page|<font color="blue">Home</font>]] | + | |
- | * [[Marketing|<font color="blue">Marketing</font>]] | + | |
- | * [[Events|<font color="blue">Events</font>]] | + | |
- | * [[Marketing/Advertisement|<font color="blue">Advertisement</font>]] | + | |
- | * [[Escan/english/Security_Awareness|<font color="blue">Security Awareness</font>]] | + | |
- | |width="1000pt" style="width:11%; font-size:95%; white-space:nowrap;" | | + | |
- | <B><p> Knowledgebase</p></B> | + | |
- | * [[Technical Info|<font color="blue">Technical Information</font>]] | + | |
- | * [[Beta Testing|<font color="blue">Beta Testing</font>]] | + | |
- | * [[Release Candidate|<font color="blue">Release Candidate</font>]] | + | |
- | * [[User Guide|<font color="blue">User Guides</font>]] | + | |
- | * [[Escan/english/Technologies|<font color="blue">Technologies</font>]] | + | |
- | |width="1000pt" style="width:11%; font-size:95%;white-space:nowrap;" | | + | |
- | <B><p> Support</p></B> | + | |
- | * [[EMail|<font color="blue">eMail</font>]] | + | |
- | * [[Online Chat|<font color="blue">Online Chat</font>]] | + | |
- | * [[Telephonic Support|<font color="blue">Telephone</font>]] | + | |
- | * [[Remote Support|<font color="blue">Remote Support</font>]] | + | |
- | * [[Forums|<font color="blue">Forums</font>]] | + | |
- | |} | + | |
- | {| class="wikitable" border="0" | + | |
- | |} | + | |
- | | + | |
| {| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | | {| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" |
| | style="width:10%; color:#000;" | | | | style="width:10%; color:#000;" | |
Line 36: |
Line 6: |
| | [[Image:escan-g.jpg]] | | | [[Image:escan-g.jpg]] |
| |} | | |} |
- | |style="text-align:left;"| '''·''' [[Online Guide - Escan for Linux Desktop|<font size=1.5 color="blue">FAQ</font>]] | + | |style="text-align:left;"|'''·''' [[Escan/english/FAQ-eScan|<font size=1.5 color="blue" |
- | |style="text-align:right;"| '''·''' [[Technical Info|<font size=1.5 color="blue">Technical Information - Main Page</font>]] | + | |
| + | align="left">eScan</font>]] '''·''' [[Escan/english/MailScan-AFT|<font size=1.5 |
| + | |
| + | color="blue">MailScan</font>]] '''·''' [[Escan/english/Technologies|<font size=1.5 |
| + | |
| + | color="blue">Technologies</font>]] |
| + | |style="text-align:right;"| '''·''' [[Technical Info|<font size=1.5 color="blue">Technical |
| + | |
| + | Info</font>]] '''·''' [[Escan/english/Security_Awareness|<font size=1.5 color="blue">Security |
| + | |
| + | Awareness</font>]] '''·''' [[User_Guides|<font size=1.5 color="blue">User Guides</font>]] |
| |} | | |} |
| | | |
Line 51: |
Line 31: |
| <br/> | | <br/> |
| __TOC__ | | __TOC__ |
| + | |
| + | |
| {| class="wikitable" border="0" | | {| class="wikitable" border="0" |
| |- | | |- |
Line 56: |
Line 38: |
| | style="width:56%; color:#000;" | | | | style="width:56%; color:#000;" | |
| <!--==1-4-2010==--> | | <!--==1-4-2010==--> |
- | ===<B><font size=2>Remote Command Execution Vulnerability in MWADMIN version <= 4.1.x </font></B>=== | + | ===<B><font size=2>eScan Web Management Console Command Injection</font></B>=== |
| :*<B>Release Date:</B> | | :*<B>Release Date:</B> |
- | ::1st April 2010. | + | ::17th April 2014. |
| {| class="wikitable" border="0" cellspacing="0" width="100%" | | {| class="wikitable" border="0" cellspacing="0" width="100%" |
| |- | | |- |
Line 64: |
Line 46: |
| ! | | ! |
| |- | | |- |
- | |width="500pt"| | + | |width="500pt" valign="top"| |
| *<B>Technical Info:</B> | | *<B>Technical Info:</B> |
- | # This hotfix, for the base Package - MWADMIN, resolves the Remote Command<br/> Execution Vulnerability issue reported in prior versions 4.1.x of MWADMIN <br/>package. | + | # This hotfix resolves the issue of <br/> Command Injection vulnerability in <br/>eScan Web Management Console<br/> in module MWADMIN version 5.x. |
- | # This hotfix is required to be applied in the below products where the version<br/> of MWADMIN is less than 4.1.x | + | |
- | :*eScan for Linux Desktop | + | |
- | :*eScan for Linux File Servers | + | |
- | :*MailScan for Linux Mailservers | + | |
- | :*WebScan for Linux Proxy Servers | + | |
| |width="500pt"| | | |width="500pt"| |
| *<B>How to install this hotfix?</B> | | *<B>How to install this hotfix?</B> |
- | # Extract the es_hotfix_1.zip or the es_hotfix_1_fp.zip <br/>(as per the linux distributions listed below).<br/> | + | # Unzip the escan_mwadmin_patch.zip. All the file will be extracted to escan_mwadmin_patch directory,.<br/> |
- | # Go to es_hotfix_1 directory (for es_hotfix_1.zip)<br/><B>OR</B><br/>es_hotfix_1_fp directory (for es_hotfix_1_fp.zip) | + | # Go to escan_mwadmin_patch directory and execute the install.sh (root permission is required to execute this script)<br/> |
- | # Run ./install.sh and patch will be applied successfully. | + | #./install.sh |
- | | + | <br/> |
- | | + | |
- | | + | |
- | | + | |
| |} | | |} |
| {| class="wikitable" border="0" cellspacing="0" width="100%" | | {| class="wikitable" border="0" cellspacing="0" width="100%" |
| |- | | |- |
| + | ! |
| ! | | ! |
| ! | | ! |
| |- | | |- |
| |width="500pt"| | | |width="500pt"| |
- | * <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/es_hotfix_1.zip Click here to download the Hotfix for the following Linux distributions:]</span></B> | + | * <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/escan_mwadmin_patch.zip Click here to download the hotfix]</span></B> |
- | :* Debian 5.0.3 | + | <br/> |
- | :* Fedora Core 6 | + | |} |
- | :* Fedora 8 | + | |} |
- | :* Fedora 9 | + | <!--=1=--> |
- | :* RHEL 5 (32 bit & 64 bit) | + | |
- | :* Slackware 12.3 | + | |
- | :* SLES 10.2 | + | |
- | :* SLES 11 | + | |
- | :* Ubuntu 8.10 | + | |
- | :* Ubuntu 9.10 | + | |
- | |width="500pt"| | + | |
- | * <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/es_hotfix_1_fp.zip Click here to download the Hotfix for the following Linux distributions]</span></B> | + | |
- | :* Fedora Core 3 | + | |
- | :* RHEL 4 | + | |
- | :* SLES 10 | + | |
- | :* SLES 10.2 (64 bit) | + | |
| | | |
| | | |
| | | |
- | | |
- | | |
- | | |
- | | |
- | | |
- | | |
- | | |
- | | |
- | |} | |
- | |} | |
- | <!--=1=--> | |
| {| class="wikitable" border="0" | | {| class="wikitable" border="0" |
| |- | | |- |
Line 180: |
Line 132: |
| |} | | |} |
| |} | | |} |
| + | |
| + | |
| + | |
| + | {| class="wikitable" border="0" |
| + | |- |
| + | {| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" |
| + | | style="width:56%; color:#000;" | |
| + | <!--==1-4-2010==--> |
| + | ===<B><font size=2>Remote Command Execution Vulnerability in MWADMIN version <= 4.1.x </font></B>=== |
| + | :*<B>Release Date:</B> |
| + | ::1st April 2010. |
| + | {| class="wikitable" border="0" cellspacing="0" width="100%" |
| + | |- |
| + | ! |
| + | ! |
| + | |- |
| + | |width="500pt"| |
| + | *<B>Technical Info:</B> |
| + | # This hotfix, for the base Package - MWADMIN, resolves the Remote Command<br/> Execution Vulnerability issue reported in prior versions 4.1.x of MWADMIN <br/>package. |
| + | # This hotfix is required to be applied in the below products where the version<br/> of MWADMIN is less than 4.1.x |
| + | :*eScan for Linux Desktop |
| + | :*eScan for Linux File Servers |
| + | :*MailScan for Linux Mailservers |
| + | :*WebScan for Linux Proxy Servers |
| + | |width="500pt"| |
| + | *<B>How to install this hotfix?</B> |
| + | # Extract the es_hotfix_1.zip or the es_hotfix_1_fp.zip <br/>(as per the linux distributions listed below).<br/> |
| + | # Go to es_hotfix_1 directory (for es_hotfix_1.zip)<br/><B>OR</B><br/>es_hotfix_1_fp directory (for es_hotfix_1_fp.zip) |
| + | # Run ./install.sh and patch will be applied successfully. |
| + | |
| + | |
| + | |
| + | |
| + | |} |
| + | {| class="wikitable" border="0" cellspacing="0" width="100%" |
| + | |- |
| + | ! |
| + | ! |
| + | |- |
| + | |width="500pt"| |
| + | * <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/es_hotfix_1.zip Click here to download the Hotfix for the following Linux distributions:]</span></B> |
| + | :* Debian 5.0.3 |
| + | :* Fedora Core 6 |
| + | :* Fedora 8 |
| + | :* Fedora 9 |
| + | :* RHEL 5 (32 bit & 64 bit) |
| + | :* Slackware 12.3 |
| + | :* SLES 10.2 |
| + | :* SLES 11 |
| + | :* Ubuntu 8.10 |
| + | :* Ubuntu 9.10 |
| + | |width="500pt"| |
| + | * <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/es_hotfix_1_fp.zip Click here to download the Hotfix for the following Linux distributions]</span></B> |
| + | :* Fedora Core 3 |
| + | :* RHEL 4 |
| + | :* SLES 10 |
| + | :* SLES 10.2 (64 bit) |
| + | |
| + | |
| + | |
| + | |
| + | |
| + | |
| + | |
| + | |
| + | |
| + | |
| + | |
| + | |} |
| + | |} |
| + | <!--=1=--> |