Revision as of 12:36, 20 October 2010 WikiSysop (Talk | contribs)
← Previous diff |
Current revision WikiSysop (Talk | contribs)
|
Line 6: |
Line 6: |
| | [[Image:escan-g.jpg]] | | | [[Image:escan-g.jpg]] |
| |} | | |} |
- | |style="text-align:left;"|'''·''' [[Escan/english/FAQ-eScan|<font size=1.5 color="blue" align="left">eScan</font>]] '''·''' [[Escan/english/MailScan-AFT|<font size=1.5 color="blue">Mailscan</font>]] '''·''' [[Escan/english/Technologies|<font size=1.5 color="blue">Technologies</font>]] | + | |style="text-align:left;"|'''·''' [[Escan/english/FAQ-eScan|<font size=1.5 color="blue" |
- | |style="text-align:right;"| '''·''' [[Technical Info|<font size=1.5 color="blue">Technical Info</font>]] '''·''' [[Escan/english/Security_Awareness|<font size=1.5 color="blue">Security Awareness</font>]] '''·''' [[User_Guides|<font size=1.5 color="blue">User Guides</font>]] | + | |
| + | align="left">eScan</font>]] '''·''' [[Escan/english/MailScan-AFT|<font size=1.5 |
| + | |
| + | color="blue">MailScan</font>]] '''·''' [[Escan/english/Technologies|<font size=1.5 |
| + | |
| + | color="blue">Technologies</font>]] |
| + | |style="text-align:right;"| '''·''' [[Technical Info|<font size=1.5 color="blue">Technical |
| + | |
| + | Info</font>]] '''·''' [[Escan/english/Security_Awareness|<font size=1.5 color="blue">Security |
| + | |
| + | Awareness</font>]] '''·''' [[User_Guides|<font size=1.5 color="blue">User Guides</font>]] |
| |} | | |} |
| | | |
Line 21: |
Line 31: |
| <br/> | | <br/> |
| __TOC__ | | __TOC__ |
| + | |
| + | |
| {| class="wikitable" border="0" | | {| class="wikitable" border="0" |
| |- | | |- |
Line 26: |
Line 38: |
| | style="width:56%; color:#000;" | | | | style="width:56%; color:#000;" | |
| <!--==1-4-2010==--> | | <!--==1-4-2010==--> |
- | ===<B><font size=2>Remote Command Execution Vulnerability in MWADMIN version <= 4.1.x </font></B>=== | + | ===<B><font size=2>eScan Web Management Console Command Injection</font></B>=== |
| :*<B>Release Date:</B> | | :*<B>Release Date:</B> |
- | ::1st April 2010. | + | ::17th April 2014. |
| {| class="wikitable" border="0" cellspacing="0" width="100%" | | {| class="wikitable" border="0" cellspacing="0" width="100%" |
| |- | | |- |
Line 34: |
Line 46: |
| ! | | ! |
| |- | | |- |
- | |width="500pt"| | + | |width="500pt" valign="top"| |
| *<B>Technical Info:</B> | | *<B>Technical Info:</B> |
- | # This hotfix, for the base Package - MWADMIN, resolves the Remote Command<br/> Execution Vulnerability issue reported in prior versions 4.1.x of MWADMIN <br/>package. | + | # This hotfix resolves the issue of <br/> Command Injection vulnerability in <br/>eScan Web Management Console<br/> in module MWADMIN version 5.x. |
- | # This hotfix is required to be applied in the below products where the version<br/> of MWADMIN is less than 4.1.x | + | |
- | :*eScan for Linux Desktop | + | |
- | :*eScan for Linux File Servers | + | |
- | :*MailScan for Linux Mailservers | + | |
- | :*WebScan for Linux Proxy Servers | + | |
| |width="500pt"| | | |width="500pt"| |
| *<B>How to install this hotfix?</B> | | *<B>How to install this hotfix?</B> |
- | # Extract the es_hotfix_1.zip or the es_hotfix_1_fp.zip <br/>(as per the linux distributions listed below).<br/> | + | # Unzip the escan_mwadmin_patch.zip. All the file will be extracted to escan_mwadmin_patch directory,.<br/> |
- | # Go to es_hotfix_1 directory (for es_hotfix_1.zip)<br/><B>OR</B><br/>es_hotfix_1_fp directory (for es_hotfix_1_fp.zip) | + | # Go to escan_mwadmin_patch directory and execute the install.sh (root permission is required to execute this script)<br/> |
- | # Run ./install.sh and patch will be applied successfully. | + | #./install.sh |
- | | + | <br/> |
- | | + | |
- | | + | |
- | | + | |
| |} | | |} |
| {| class="wikitable" border="0" cellspacing="0" width="100%" | | {| class="wikitable" border="0" cellspacing="0" width="100%" |
| |- | | |- |
| + | ! |
| ! | | ! |
| ! | | ! |
| |- | | |- |
| |width="500pt"| | | |width="500pt"| |
- | * <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/es_hotfix_1.zip Click here to download the Hotfix for the following Linux distributions:]</span></B> | + | * <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/escan_mwadmin_patch.zip Click here to download the hotfix]</span></B> |
- | :* Debian 5.0.3 | + | <br/> |
- | :* Fedora Core 6 | + | |} |
- | :* Fedora 8 | + | |} |
- | :* Fedora 9 | + | <!--=1=--> |
- | :* RHEL 5 (32 bit & 64 bit) | + | |
- | :* Slackware 12.3 | + | |
- | :* SLES 10.2 | + | |
- | :* SLES 11 | + | |
- | :* Ubuntu 8.10 | + | |
- | :* Ubuntu 9.10 | + | |
- | |width="500pt"| | + | |
- | * <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/es_hotfix_1_fp.zip Click here to download the Hotfix for the following Linux distributions]</span></B> | + | |
- | :* Fedora Core 3 | + | |
- | :* RHEL 4 | + | |
- | :* SLES 10 | + | |
- | :* SLES 10.2 (64 bit) | + | |
- | | + | |
- | | + | |
- | | + | |
- | | + | |
| | | |
| | | |
| | | |
- | | |
- | | |
- | | |
- | | |
- | |} | |
- | |} | |
- | <!--=1=--> | |
| {| class="wikitable" border="0" | | {| class="wikitable" border="0" |
| |- | | |- |
Line 150: |
Line 132: |
| |} | | |} |
| |} | | |} |
| + | |
| + | |
| + | |
| + | {| class="wikitable" border="0" |
| + | |- |
| + | {| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" |
| + | | style="width:56%; color:#000;" | |
| + | <!--==1-4-2010==--> |
| + | ===<B><font size=2>Remote Command Execution Vulnerability in MWADMIN version <= 4.1.x </font></B>=== |
| + | :*<B>Release Date:</B> |
| + | ::1st April 2010. |
| + | {| class="wikitable" border="0" cellspacing="0" width="100%" |
| + | |- |
| + | ! |
| + | ! |
| + | |- |
| + | |width="500pt"| |
| + | *<B>Technical Info:</B> |
| + | # This hotfix, for the base Package - MWADMIN, resolves the Remote Command<br/> Execution Vulnerability issue reported in prior versions 4.1.x of MWADMIN <br/>package. |
| + | # This hotfix is required to be applied in the below products where the version<br/> of MWADMIN is less than 4.1.x |
| + | :*eScan for Linux Desktop |
| + | :*eScan for Linux File Servers |
| + | :*MailScan for Linux Mailservers |
| + | :*WebScan for Linux Proxy Servers |
| + | |width="500pt"| |
| + | *<B>How to install this hotfix?</B> |
| + | # Extract the es_hotfix_1.zip or the es_hotfix_1_fp.zip <br/>(as per the linux distributions listed below).<br/> |
| + | # Go to es_hotfix_1 directory (for es_hotfix_1.zip)<br/><B>OR</B><br/>es_hotfix_1_fp directory (for es_hotfix_1_fp.zip) |
| + | # Run ./install.sh and patch will be applied successfully. |
| + | |
| + | |
| + | |
| + | |
| + | |} |
| + | {| class="wikitable" border="0" cellspacing="0" width="100%" |
| + | |- |
| + | ! |
| + | ! |
| + | |- |
| + | |width="500pt"| |
| + | * <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/es_hotfix_1.zip Click here to download the Hotfix for the following Linux distributions:]</span></B> |
| + | :* Debian 5.0.3 |
| + | :* Fedora Core 6 |
| + | :* Fedora 8 |
| + | :* Fedora 9 |
| + | :* RHEL 5 (32 bit & 64 bit) |
| + | :* Slackware 12.3 |
| + | :* SLES 10.2 |
| + | :* SLES 11 |
| + | :* Ubuntu 8.10 |
| + | :* Ubuntu 9.10 |
| + | |width="500pt"| |
| + | * <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/es_hotfix_1_fp.zip Click here to download the Hotfix for the following Linux distributions]</span></B> |
| + | :* Fedora Core 3 |
| + | :* RHEL 4 |
| + | :* SLES 10 |
| + | :* SLES 10.2 (64 bit) |
| + | |
| + | |
| + | |
| + | |
| + | |
| + | |
| + | |
| + | |
| + | |
| + | |
| + | |
| + | |} |
| + | |} |
| + | <!--=1=--> |