Revision as of 12:36, 20 October 2010 WikiSysop (Talk | contribs)
← Previous diff |
Current revision WikiSysop (Talk | contribs)
|
| Line 6: |
Line 6: |
| | | [[Image:escan-g.jpg]] | | | [[Image:escan-g.jpg]] |
| | |} | | |} |
| - | |style="text-align:left;"|'''·''' [[Escan/english/FAQ-eScan|<font size=1.5 color="blue" align="left">eScan</font>]] '''·''' [[Escan/english/MailScan-AFT|<font size=1.5 color="blue">Mailscan</font>]] '''·''' [[Escan/english/Technologies|<font size=1.5 color="blue">Technologies</font>]] | + | |style="text-align:left;"|'''·''' [[Escan/english/FAQ-eScan|<font size=1.5 color="blue" |
| - | |style="text-align:right;"| '''·''' [[Technical Info|<font size=1.5 color="blue">Technical Info</font>]] '''·''' [[Escan/english/Security_Awareness|<font size=1.5 color="blue">Security Awareness</font>]] '''·''' [[User_Guides|<font size=1.5 color="blue">User Guides</font>]] | + | |
| | + | align="left">eScan</font>]] '''·''' [[Escan/english/MailScan-AFT|<font size=1.5 |
| | + | |
| | + | color="blue">MailScan</font>]] '''·''' [[Escan/english/Technologies|<font size=1.5 |
| | + | |
| | + | color="blue">Technologies</font>]] |
| | + | |style="text-align:right;"| '''·''' [[Technical Info|<font size=1.5 color="blue">Technical |
| | + | |
| | + | Info</font>]] '''·''' [[Escan/english/Security_Awareness|<font size=1.5 color="blue">Security |
| | + | |
| | + | Awareness</font>]] '''·''' [[User_Guides|<font size=1.5 color="blue">User Guides</font>]] |
| | |} | | |} |
| | | | |
| Line 21: |
Line 31: |
| | <br/> | | <br/> |
| | __TOC__ | | __TOC__ |
| | + | |
| | + | |
| | {| class="wikitable" border="0" | | {| class="wikitable" border="0" |
| | |- | | |- |
| Line 26: |
Line 38: |
| | | style="width:56%; color:#000;" | | | | style="width:56%; color:#000;" | |
| | <!--==1-4-2010==--> | | <!--==1-4-2010==--> |
| - | ===<B><font size=2>Remote Command Execution Vulnerability in MWADMIN version <= 4.1.x </font></B>=== | + | ===<B><font size=2>eScan Web Management Console Command Injection</font></B>=== |
| | :*<B>Release Date:</B> | | :*<B>Release Date:</B> |
| - | ::1st April 2010. | + | ::17th April 2014. |
| | {| class="wikitable" border="0" cellspacing="0" width="100%" | | {| class="wikitable" border="0" cellspacing="0" width="100%" |
| | |- | | |- |
| Line 34: |
Line 46: |
| | ! | | ! |
| | |- | | |- |
| - | |width="500pt"| | + | |width="500pt" valign="top"| |
| | *<B>Technical Info:</B> | | *<B>Technical Info:</B> |
| - | # This hotfix, for the base Package - MWADMIN, resolves the Remote Command<br/> Execution Vulnerability issue reported in prior versions 4.1.x of MWADMIN <br/>package. | + | # This hotfix resolves the issue of <br/> Command Injection vulnerability in <br/>eScan Web Management Console<br/> in module MWADMIN version 5.x. |
| - | # This hotfix is required to be applied in the below products where the version<br/> of MWADMIN is less than 4.1.x | + | |
| - | :*eScan for Linux Desktop | + | |
| - | :*eScan for Linux File Servers | + | |
| - | :*MailScan for Linux Mailservers | + | |
| - | :*WebScan for Linux Proxy Servers | + | |
| | |width="500pt"| | | |width="500pt"| |
| | *<B>How to install this hotfix?</B> | | *<B>How to install this hotfix?</B> |
| - | # Extract the es_hotfix_1.zip or the es_hotfix_1_fp.zip <br/>(as per the linux distributions listed below).<br/> | + | # Unzip the escan_mwadmin_patch.zip. All the file will be extracted to escan_mwadmin_patch directory,.<br/> |
| - | # Go to es_hotfix_1 directory (for es_hotfix_1.zip)<br/><B>OR</B><br/>es_hotfix_1_fp directory (for es_hotfix_1_fp.zip) | + | # Go to escan_mwadmin_patch directory and execute the install.sh (root permission is required to execute this script)<br/> |
| - | # Run ./install.sh and patch will be applied successfully. | + | #./install.sh |
| - | | + | <br/> |
| - | | + | |
| - | | + | |
| - | | + | |
| | |} | | |} |
| | {| class="wikitable" border="0" cellspacing="0" width="100%" | | {| class="wikitable" border="0" cellspacing="0" width="100%" |
| | |- | | |- |
| | + | ! |
| | ! | | ! |
| | ! | | ! |
| | |- | | |- |
| | |width="500pt"| | | |width="500pt"| |
| - | * <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/es_hotfix_1.zip Click here to download the Hotfix for the following Linux distributions:]</span></B> | + | * <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/escan_mwadmin_patch.zip Click here to download the hotfix]</span></B> |
| - | :* Debian 5.0.3 | + | <br/> |
| - | :* Fedora Core 6 | + | |} |
| - | :* Fedora 8 | + | |} |
| - | :* Fedora 9 | + | <!--=1=--> |
| - | :* RHEL 5 (32 bit & 64 bit) | + | |
| - | :* Slackware 12.3 | + | |
| - | :* SLES 10.2 | + | |
| - | :* SLES 11 | + | |
| - | :* Ubuntu 8.10 | + | |
| - | :* Ubuntu 9.10 | + | |
| - | |width="500pt"| | + | |
| - | * <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/es_hotfix_1_fp.zip Click here to download the Hotfix for the following Linux distributions]</span></B> | + | |
| - | :* Fedora Core 3 | + | |
| - | :* RHEL 4 | + | |
| - | :* SLES 10 | + | |
| - | :* SLES 10.2 (64 bit) | + | |
| - | | + | |
| - | | + | |
| - | | + | |
| - | | + | |
| | | | |
| | | | |
| | | | |
| - | | |
| - | | |
| - | | |
| - | | |
| - | |} | |
| - | |} | |
| - | <!--=1=--> | |
| | {| class="wikitable" border="0" | | {| class="wikitable" border="0" |
| | |- | | |- |
| Line 150: |
Line 132: |
| | |} | | |} |
| | |} | | |} |
| | + | |
| | + | |
| | + | |
| | + | {| class="wikitable" border="0" |
| | + | |- |
| | + | {| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" |
| | + | | style="width:56%; color:#000;" | |
| | + | <!--==1-4-2010==--> |
| | + | ===<B><font size=2>Remote Command Execution Vulnerability in MWADMIN version <= 4.1.x </font></B>=== |
| | + | :*<B>Release Date:</B> |
| | + | ::1st April 2010. |
| | + | {| class="wikitable" border="0" cellspacing="0" width="100%" |
| | + | |- |
| | + | ! |
| | + | ! |
| | + | |- |
| | + | |width="500pt"| |
| | + | *<B>Technical Info:</B> |
| | + | # This hotfix, for the base Package - MWADMIN, resolves the Remote Command<br/> Execution Vulnerability issue reported in prior versions 4.1.x of MWADMIN <br/>package. |
| | + | # This hotfix is required to be applied in the below products where the version<br/> of MWADMIN is less than 4.1.x |
| | + | :*eScan for Linux Desktop |
| | + | :*eScan for Linux File Servers |
| | + | :*MailScan for Linux Mailservers |
| | + | :*WebScan for Linux Proxy Servers |
| | + | |width="500pt"| |
| | + | *<B>How to install this hotfix?</B> |
| | + | # Extract the es_hotfix_1.zip or the es_hotfix_1_fp.zip <br/>(as per the linux distributions listed below).<br/> |
| | + | # Go to es_hotfix_1 directory (for es_hotfix_1.zip)<br/><B>OR</B><br/>es_hotfix_1_fp directory (for es_hotfix_1_fp.zip) |
| | + | # Run ./install.sh and patch will be applied successfully. |
| | + | |
| | + | |
| | + | |
| | + | |
| | + | |} |
| | + | {| class="wikitable" border="0" cellspacing="0" width="100%" |
| | + | |- |
| | + | ! |
| | + | ! |
| | + | |- |
| | + | |width="500pt"| |
| | + | * <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/es_hotfix_1.zip Click here to download the Hotfix for the following Linux distributions:]</span></B> |
| | + | :* Debian 5.0.3 |
| | + | :* Fedora Core 6 |
| | + | :* Fedora 8 |
| | + | :* Fedora 9 |
| | + | :* RHEL 5 (32 bit & 64 bit) |
| | + | :* Slackware 12.3 |
| | + | :* SLES 10.2 |
| | + | :* SLES 11 |
| | + | :* Ubuntu 8.10 |
| | + | :* Ubuntu 9.10 |
| | + | |width="500pt"| |
| | + | * <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/es_hotfix_1_fp.zip Click here to download the Hotfix for the following Linux distributions]</span></B> |
| | + | :* Fedora Core 3 |
| | + | :* RHEL 4 |
| | + | :* SLES 10 |
| | + | :* SLES 10.2 (64 bit) |
| | + | |
| | + | |
| | + | |
| | + | |
| | + | |
| | + | |
| | + | |
| | + | |
| | + | |
| | + | |
| | + | |
| | + | |} |
| | + | |} |
| | + | <!--=1=--> |