eScan BlogeScan Blog    eScan WebsiteeScan Website    eScan ForumeScan Forum    eScan FeedseScan Feeds     
    
Languages:     

From eScan Wiki

(Difference between revisions)
Jump to: navigation, search
Revision as of 10:12, 14 October 2010
WikiSysop (Talk | contribs)

← Previous diff
Current revision
WikiSysop (Talk | contribs)

Line 1: Line 1:
- 
{| class="wikitable" border="0" {| class="wikitable" border="0"
-|}+|-
- +
{| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" {| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;"
| style="width:10%; color:#000;" | | style="width:10%; color:#000;" |
Line 8: Line 6:
| [[Image:escan-g.jpg]] | [[Image:escan-g.jpg]]
|} |}
-|style="text-align:left;"|&nbsp;&nbsp;'''·''' [[Online Guide - Escan for Linux Desktop|<font size=1.5 color="blue">FAQ</font>]]&nbsp;&nbsp;+|style="text-align:left;"|'''·''' [[Escan/english/FAQ-eScan|<font size=1.5 color="blue"
-|style="text-align:right;"|&nbsp;&nbsp;'''·''' [[Technical Info|<font size=1.5 color="blue">Technical Information - Main Page</font>]]+ 
 +align="left">eScan</font>]]&nbsp;&nbsp;'''·''' [[Escan/english/MailScan-AFT|<font size=1.5
 + 
 +color="blue">MailScan</font>]]&nbsp;&nbsp;'''·''' [[Escan/english/Technologies|<font size=1.5
 + 
 +color="blue">Technologies</font>]]
 +|style="text-align:right;"|&nbsp;&nbsp;'''·''' [[Technical Info|<font size=1.5 color="blue">Technical
 + 
 +Info</font>]]&nbsp;&nbsp;'''·''' [[Escan/english/Security_Awareness|<font size=1.5 color="blue">Security
 + 
 +Awareness</font>]]&nbsp;&nbsp;'''·''' [[User_Guides|<font size=1.5 color="blue">User Guides</font>]]
|} |}
Line 23: Line 31:
<br/> <br/>
__TOC__ __TOC__
 +
 +
{| class="wikitable" border="0" {| class="wikitable" border="0"
|- |-
Line 28: Line 38:
| style="width:56%; color:#000;" | | style="width:56%; color:#000;" |
<!--==1-4-2010==--> <!--==1-4-2010==-->
-===<B><font size=2>Remote Command Execution Vulnerability in MWADMIN version <= 4.1.x </font></B>===+===<B><font size=2>eScan Web Management Console Command Injection</font></B>===
:*<B>Release Date:</B> :*<B>Release Date:</B>
-::1st April 2010.+::17th April 2014.
{| class="wikitable" border="0" cellspacing="0" width="100%" {| class="wikitable" border="0" cellspacing="0" width="100%"
|- |-
Line 36: Line 46:
! !
|- |-
-|width="500pt"|+|width="500pt" valign="top"|
*<B>Technical Info:</B> *<B>Technical Info:</B>
-# This hotfix, for the base Package - MWADMIN, resolves the Remote Command<br/> Execution Vulnerability issue reported in prior versions 4.1.x of MWADMIN <br/>package.+# This hotfix resolves the issue of <br/> Command Injection vulnerability in <br/>eScan Web Management Console<br/> in module MWADMIN version 5.x.
-# This hotfix is required to be applied in the below products where the version<br/> of MWADMIN is less than 4.1.x+
-:*eScan for Linux Desktop+
-:*eScan for Linux File Servers+
-:*MailScan for Linux Mailservers+
-:*WebScan for Linux Proxy Servers+
|width="500pt"| |width="500pt"|
*<B>How to install this hotfix?</B> *<B>How to install this hotfix?</B>
-# Extract the es_hotfix_1.zip or the es_hotfix_1_fp.zip <br/>(as per the linux distributions listed below).<br/>+# Unzip the escan_mwadmin_patch.zip. All the file will be extracted to escan_mwadmin_patch directory,.<br/>
-# Go to es_hotfix_1 directory (for es_hotfix_1.zip)<br/><B>OR</B><br/>es_hotfix_1_fp directory (for es_hotfix_1_fp.zip)+# Go to escan_mwadmin_patch directory and execute the install.sh (root permission is required to execute this script)<br/>
-# Run ./install.sh and patch will be applied successfully.+ #./install.sh
- +<br/>
- +
- +
- +
|} |}
{| class="wikitable" border="0" cellspacing="0" width="100%" {| class="wikitable" border="0" cellspacing="0" width="100%"
|- |-
 +!
! !
! !
|- |-
|width="500pt"| |width="500pt"|
-* <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/es_hotfix_1.zip Click here to download the Hotfix for the following Linux distributions:]</span></B>+* <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/escan_mwadmin_patch.zip Click here to download the hotfix]</span></B>
-:* Debian 5.0.3+<br/>
-:* Fedora Core 6+|}
-:* Fedora 8+|}
-:* Fedora 9+<!--=1=-->
-:* RHEL 5 (32 bit & 64 bit)+
-:* Slackware 12.3+
-:* SLES 10.2 +
-:* SLES 11+
-:* Ubuntu 8.10+
-:* Ubuntu 9.10+
-|width="500pt"|+
-* <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/es_hotfix_1_fp.zip Click here to download the Hotfix for the following Linux distributions]</span></B>+
-:* Fedora Core 3+
-:* RHEL 4+
-:* SLES 10+
-:* SLES 10.2 (64 bit)+
- 
- 
- 
- 
- 
- 
- 
- 
-|} 
-|} 
-<!--=1=--> 
{| class="wikitable" border="0" {| class="wikitable" border="0"
|- |-
Line 152: Line 132:
|} |}
|} |}
 +
 +
 +
 +{| class="wikitable" border="0"
 +|-
 +{| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;"
 +| style="width:56%; color:#000;" |
 +<!--==1-4-2010==-->
 +===<B><font size=2>Remote Command Execution Vulnerability in MWADMIN version <= 4.1.x </font></B>===
 +:*<B>Release Date:</B>
 +::1st April 2010.
 +{| class="wikitable" border="0" cellspacing="0" width="100%"
 +|-
 +!
 +!
 +|-
 +|width="500pt"|
 +*<B>Technical Info:</B>
 +# This hotfix, for the base Package - MWADMIN, resolves the Remote Command<br/> Execution Vulnerability issue reported in prior versions 4.1.x of MWADMIN <br/>package.
 +# This hotfix is required to be applied in the below products where the version<br/> of MWADMIN is less than 4.1.x
 +:*eScan for Linux Desktop
 +:*eScan for Linux File Servers
 +:*MailScan for Linux Mailservers
 +:*WebScan for Linux Proxy Servers
 +|width="500pt"|
 +*<B>How to install this hotfix?</B>
 +# Extract the es_hotfix_1.zip or the es_hotfix_1_fp.zip <br/>(as per the linux distributions listed below).<br/>
 +# Go to es_hotfix_1 directory (for es_hotfix_1.zip)<br/><B>OR</B><br/>es_hotfix_1_fp directory (for es_hotfix_1_fp.zip)
 +# Run ./install.sh and patch will be applied successfully.
 +
 +
 +
 +
 +|}
 +{| class="wikitable" border="0" cellspacing="0" width="100%"
 +|-
 +!
 +!
 +|-
 +|width="500pt"|
 +* <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/es_hotfix_1.zip Click here to download the Hotfix for the following Linux distributions:]</span></B>
 +:* Debian 5.0.3
 +:* Fedora Core 6
 +:* Fedora 8
 +:* Fedora 9
 +:* RHEL 5 (32 bit & 64 bit)
 +:* Slackware 12.3
 +:* SLES 10.2
 +:* SLES 11
 +:* Ubuntu 8.10
 +:* Ubuntu 9.10
 +|width="500pt"|
 +* <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/es_hotfix_1_fp.zip Click here to download the Hotfix for the following Linux distributions]</span></B>
 +:* Fedora Core 3
 +:* RHEL 4
 +:* SLES 10
 +:* SLES 10.2 (64 bit)
 +
 +
 +
 +
 +
 +
 +
 +
 +
 +
 +
 +|}
 +|}
 +<!--=1=-->

Current revision

Image:escan-g.jpg
· eScan  · MailScan  · Technologies   · Technical Info  · Security Awareness  · User Guides
Hotfixes for Linux products


Contents


eScan Web Management Console Command Injection

  • Release Date:
17th April 2014.
  • Technical Info:
  1. This hotfix resolves the issue of
    Command Injection vulnerability in
    eScan Web Management Console
    in module MWADMIN version 5.x.
  • How to install this hotfix?
  1. Unzip the escan_mwadmin_patch.zip. All the file will be extracted to escan_mwadmin_patch directory,.
  2. Go to escan_mwadmin_patch directory and execute the install.sh (root permission is required to execute this script)
       #./install.sh




Clam AV service in MicroWorld products for Linux does not start after updates

  • Release Date:
3rd May 2010.
  • Technical Info:
  1. This hotfix resolves the issue of CLAM AV service, in MicroWorld product for
    Linux, either stops or does not restarts after downloading the latest AV updates.
  2. This hotfix will upgrade to the latest version of CLAM AV engine in MicroWorld
    products for</br> Linux.
  3. Click here to read the Announcements




  • How to install this hotfix?
  1. Extract the mwcav_hotfix_<linux-release-version>.zip
  2. Go to extracted directory mwcav_hotfix_<linux-release-version>
  3. Run ./install.sh and patch will be applied successfully,
  4. Then update the Clam av from the Web-Administration,
  5. Restart the Clam antivirus service either from the Web-Administration or by the below command from the terminal:
/opt/MicroWorld/etc/init.d/mwcav start

Download Hotfix for:

Note:
If you do not find the hotfix for your Linux distro, write to us at linux@escanav.com
or support@escanav.com with the below details:

  1. Product Name [eScan (Desktop or File Servers) / MailScan / WebScan] and
    product version,
  2. Linux Distribution name and release version (32 bit or 64 bit),
  3. Linux kernel version.


Remote Command Execution Vulnerability in MWADMIN version <= 4.1.x

  • Release Date:
1st April 2010.
  • Technical Info:
  1. This hotfix, for the base Package - MWADMIN, resolves the Remote Command
    Execution Vulnerability issue reported in prior versions 4.1.x of MWADMIN
    package.
  2. This hotfix is required to be applied in the below products where the version
    of MWADMIN is less than 4.1.x
  • eScan for Linux Desktop
  • eScan for Linux File Servers
  • MailScan for Linux Mailservers
  • WebScan for Linux Proxy Servers
  • How to install this hotfix?
  1. Extract the es_hotfix_1.zip or the es_hotfix_1_fp.zip
    (as per the linux distributions listed below).
  2. Go to es_hotfix_1 directory (for es_hotfix_1.zip)
    OR
    es_hotfix_1_fp directory (for es_hotfix_1_fp.zip)
  3. Run ./install.sh and patch will be applied successfully.



  • Debian 5.0.3
  • Fedora Core 6
  • Fedora 8
  • Fedora 9
  • RHEL 5 (32 bit & 64 bit)
  • Slackware 12.3
  • SLES 10.2
  • SLES 11
  • Ubuntu 8.10
  • Ubuntu 9.10
  • Fedora Core 3
  • RHEL 4
  • SLES 10
  • SLES 10.2 (64 bit)







eScan Copyright © 2015 MicroWorld Technologies Inc.- AntiVirus & Content Security.       Send your feedback to solutions@escanav.com eScan Wiki

    Privacy policy  About eScan Wiki  Disclaimers   This page has been accessed 91,824 times.