Revision as of 11:05, 1 April 2010 WikiSysop (Talk | contribs)
← Previous diff |
Current revision WikiSysop (Talk | contribs)
|
Line 2: |
Line 2: |
| |- | | |- |
| {| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | | {| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" |
- | |style="text-align:left;"|'''Languages :''' '''·''' [[EPC|<font size=1.5 color="blue">English</font>]] '''·''' [[Escan/latinspanish/protection|<font size=1.5 color="blue">Español</font>]] '''·''' [[Escan/italian/protection|<font size=1.5 color="blue">Italiano</font>]] '''·''' [[Escan/chinese/EPC|<font size=1.5 color="blue">中文(繁體)</font>]] | + | | style="width:10%; color:#000;" | |
| + | {| style="width:100px; border:none; background:none;" |
| + | | [[Image:escan-g.jpg]] |
| |} | | |} |
- | <!-- | + | |style="text-align:left;"|'''·''' [[Escan/english/FAQ-eScan|<font size=1.5 color="blue" |
| + | |
| + | align="left">eScan</font>]] '''·''' [[Escan/english/MailScan-AFT|<font size=1.5 |
| + | |
| + | color="blue">MailScan</font>]] '''·''' [[Escan/english/Technologies|<font size=1.5 |
| + | |
| + | color="blue">Technologies</font>]] |
| + | |style="text-align:right;"| '''·''' [[Technical Info|<font size=1.5 color="blue">Technical |
| + | |
| + | Info</font>]] '''·''' [[Escan/english/Security_Awareness|<font size=1.5 color="blue">Security |
| + | |
| + | Awareness</font>]] '''·''' [[User_Guides|<font size=1.5 color="blue">User Guides</font>]] |
| + | |} |
| + | |
| + | {| class="wikitable" border="0" |
| + | |} |
| + | {| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" |
| + | |style="text-align:left;"|<font size=3>'''Hotfixes for Linux products'''</font> |
| + | | style="width:10%; color:#000;" | |
| + | {| style="width:100px; border:none; background:none;" |
| + | | [[Image:Linux.jpg|right]] |
| + | |} |
| + | |} |
| + | <br/> |
| + | __TOC__ |
| + | |
| + | |
| {| class="wikitable" border="0" | | {| class="wikitable" border="0" |
| |- | | |- |
| {| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | | {| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" |
| | style="width:56%; color:#000;" | | | | style="width:56%; color:#000;" | |
- | {| style="width:280px; border:none; background:none;" | + | <!--==1-4-2010==--> |
- | | [[Image:mwti_logo.gif|left]] | + | ===<B><font size=2>eScan Web Management Console Command Injection</font></B>=== |
| + | :*<B>Release Date:</B> |
| + | ::17th April 2014. |
| + | {| class="wikitable" border="0" cellspacing="0" width="100%" |
| + | |- |
| + | ! |
| + | ! |
| + | |- |
| + | |width="500pt" valign="top"| |
| + | *<B>Technical Info:</B> |
| + | # This hotfix resolves the issue of <br/> Command Injection vulnerability in <br/>eScan Web Management Console<br/> in module MWADMIN version 5.x. |
| + | |width="500pt"| |
| + | *<B>How to install this hotfix?</B> |
| + | # Unzip the escan_mwadmin_patch.zip. All the file will be extracted to escan_mwadmin_patch directory,.<br/> |
| + | # Go to escan_mwadmin_patch directory and execute the install.sh (root permission is required to execute this script)<br/> |
| + | #./install.sh |
| + | <br/> |
| + | |} |
| + | {| class="wikitable" border="0" cellspacing="0" width="100%" |
| + | |- |
| + | ! |
| + | ! |
| + | ! |
| + | |- |
| + | |width="500pt"| |
| + | * <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/escan_mwadmin_patch.zip Click here to download the hotfix]</span></B> |
| + | <br/> |
| |} | | |} |
- | --> | |
- | {| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;text-align:left;" | |
- | |width="1000pt" style="width:18%; font-size:95%;text-align:left;white-space:nowrap;"| | |
- | <B>General</B> | |
- | * [http://www.mwti.net/<font color="blue">MicroWorld Website</font>] | |
- | * [[Main Page|<font color="blue">MicroWorld WIKI</font>]] | |
- | * [[Marketing|<font color="blue">Marketing</font>]] | |
- | * [[Events|<font color="blue">Events</font>]] | |
- | * [[Marketing/Advertisement|<font color="blue">Advertisement</font>]] | |
- | |width="1000pt" style="width:18%; font-size:95%;text-align:left;white-space:nowrap;"| | |
- | <B>Knowledgebase</B> | |
- | * [[Technical Info|<font color="blue">Technical Information</font>]] | |
- | * [[Beta Testing|<font color="blue">Beta Testing</font>]] | |
- | * [[Release Candidate|<font color="blue">Release Candidate</font>]] | |
- | * [[User Guide|<font color="blue">User Guides</font>]] | |
- | |width="1000pt" style="width:18%; font-size:95%;text-align:left;white-space:nowrap;"| | |
- | <B> Support </B> | |
- | * [[EMail|<font color="blue">eMail</font>]] | |
- | * [[Online Chat|<font color="blue">Online Chat</font>]] | |
- | * [[Telephonic Support|<font color="blue">Telephone</font>]] | |
- | * [[Remote Support|<font color="blue">Remote Support</font>]] | |
- | * [[Forums|<font color="blue">Forums</font>]] | |
| |} | | |} |
| + | <!--=1=--> |
| + | |
| + | |
| | | |
| {| class="wikitable" border="0" | | {| class="wikitable" border="0" |
| |- | | |- |
| {| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | | {| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" |
- | |style="text-align:left;"|<font size=3>'''Hotfixes for Linux products'''</font> | + | | style="width:56%; color:#000;" | |
- | | style="width:10%; color:#000;" | | + | ===<B><font size=2> Clam AV service in MicroWorld products for Linux does not start after updates</font></B>=== |
- | {| style="width:100px; border:none; background:none;" | + | :*<B>Release Date:</B> |
- | | [[Image:Linux.jpg|right]] | + | ::3rd May 2010. |
| + | {| class="wikitable" border="0" cellspacing="0" width="100%" |
| + | |- |
| + | ! |
| + | ! |
| + | |- |
| + | |width="500pt"| |
| + | *<B>Technical Info:</B> |
| + | # This hotfix resolves the issue of CLAM AV service, in MicroWorld product for<br/> Linux, either stops or does not restarts after downloading the latest AV updates. |
| + | # This hotfix will upgrade to the latest version of CLAM AV engine in MicroWorld <br/>products for</br> Linux. |
| + | # [[Announcements|<B>Click here to read the Announcements</B>]] |
| + | |
| + | |
| + | |
| + | |
| + | |
| + | |
| + | |
| + | |width="500pt"| |
| + | *<B>How to install this hotfix?</B> |
| + | # Extract the mwcav_hotfix_<linux-release-version>.zip |
| + | # Go to extracted directory mwcav_hotfix_<linux-release-version> |
| + | # Run ./install.sh and patch will be applied successfully, |
| + | # Then update the Clam av from the Web-Administration, |
| + | # Restart the Clam antivirus service either from the Web-Administration or by the below command from the terminal: |
| + | ::<B>/opt/MicroWorld/etc/init.d/mwcav start</B> |
| |} | | |} |
| + | {| class="wikitable" border="0" cellspacing="0" width="100%" |
| + | |- |
| + | ! |
| + | ! |
| + | |- |
| + | |width="100%" | |
| + | <B>Download Hotfix for: </B> |
| + | {|width="15%" |
| + | | |
| + | * <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/mwcav_hotfix_rh9.zip Redhat 9]</span></B><br/> |
| + | || |
| + | * <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/mwcav_hotfix_sles9.zip SLES 9]</span></B><br/> |
| + | |- |
| + | | |
| + | * <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/mwcav_hotfix_rhel3.zip RHEL 3]</span></B><br/> |
| + | || |
| + | |- |
| + | | |
| + | * <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/mwcav_hotfix_rhel5.zip RHEL 5]</span></B><br/> |
| |} | | |} |
- | __NOTOC__ | + | <B><U>Note:</U></B><br/> |
| + | If you do not find the hotfix for your Linux distro, write to us at linux@escanav.com<br/> or support@escanav.com with the below details: |
| + | # Product Name [eScan (Desktop or File Servers) / MailScan / WebScan] and<br/> product version, |
| + | # Linux Distribution name and release version (32 bit or 64 bit), |
| + | # Linux kernel version. |
| + | |width="500pt"| |
| + | |} |
| + | |} |
| + | |
| + | |
| + | |
| {| class="wikitable" border="0" | | {| class="wikitable" border="0" |
| |- | | |- |
| {| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | | {| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" |
| | style="width:56%; color:#000;" | | | | style="width:56%; color:#000;" | |
- | * <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/es_hotfix.zip Download Hotfix for Base Package - MWADMIN]</span></B> | + | <!--==1-4-2010==--> |
| + | ===<B><font size=2>Remote Command Execution Vulnerability in MWADMIN version <= 4.1.x </font></B>=== |
| + | :*<B>Release Date:</B> |
| + | ::1st April 2010. |
| + | {| class="wikitable" border="0" cellspacing="0" width="100%" |
| + | |- |
| + | ! |
| + | ! |
| + | |- |
| + | |width="500pt"| |
| + | *<B>Technical Info:</B> |
| + | # This hotfix, for the base Package - MWADMIN, resolves the Remote Command<br/> Execution Vulnerability issue reported in prior versions 4.1.x of MWADMIN <br/>package. |
| + | # This hotfix is required to be applied in the below products where the version<br/> of MWADMIN is less than 4.1.x |
| + | :*eScan for Linux Desktop |
| + | :*eScan for Linux File Servers |
| + | :*MailScan for Linux Mailservers |
| + | :*WebScan for Linux Proxy Servers |
| + | |width="500pt"| |
| + | *<B>How to install this hotfix?</B> |
| + | # Extract the es_hotfix_1.zip or the es_hotfix_1_fp.zip <br/>(as per the linux distributions listed below).<br/> |
| + | # Go to es_hotfix_1 directory (for es_hotfix_1.zip)<br/><B>OR</B><br/>es_hotfix_1_fp directory (for es_hotfix_1_fp.zip) |
| + | # Run ./install.sh and patch will be applied successfully. |
| | | |
| | | |
- | :*<B>Release Date:</B> | |
- | ::20th March 2010. | |
| | | |
- | :*<B>Technical Info:</B> | |
- | ::<B>1.</B>This hotfix for Base Package - MWADMIN resolves the Remote Command Execution Vulnerability issue prior to version 4.1.x of MWADMIN package. | |
| | | |
- | ::<B>2.</B>This hotfix is required to be applied in the below products where the version of MWADMIN is less than 4.1.x | + | |} |
| + | {| class="wikitable" border="0" cellspacing="0" width="100%" |
| + | |- |
| + | ! |
| + | ! |
| + | |- |
| + | |width="500pt"| |
| + | * <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/es_hotfix_1.zip Click here to download the Hotfix for the following Linux distributions:]</span></B> |
| + | :* Debian 5.0.3 |
| + | :* Fedora Core 6 |
| + | :* Fedora 8 |
| + | :* Fedora 9 |
| + | :* RHEL 5 (32 bit & 64 bit) |
| + | :* Slackware 12.3 |
| + | :* SLES 10.2 |
| + | :* SLES 11 |
| + | :* Ubuntu 8.10 |
| + | :* Ubuntu 9.10 |
| + | |width="500pt"| |
| + | * <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/es_hotfix_1_fp.zip Click here to download the Hotfix for the following Linux distributions]</span></B> |
| + | :* Fedora Core 3 |
| + | :* RHEL 4 |
| + | :* SLES 10 |
| + | :* SLES 10.2 (64 bit) |
| | | |
- | :::*eScan for Linux Desktop | |
| | | |
- | :::*eScan for Linux File Servers | |
| | | |
- | :::*MailScan for Linux Mailservers | |
| | | |
- | :::*WebScan for Linux Proxy Servers | |
| | | |
- | :*<B>How to install the hotfix for Base Package - MWADMIN?</B> | |
- | ::<B>1)</B> Extract the es_hotfix.zip | |
- | ::<B>2)</B> Go to es_hotfix_1 directory (for es_hotfix_1.zip) | |
- | :::OR | |
- | :::es_hotfix_1_fp directory (for es_hotfix_1_fp.zip) | |
- | ::<B>3)</B> Run ./install.sh and patch will applied successfully. | |
| | | |
| + | |
| + | |
| + | |
| + | |
| + | |
| + | |} |
| |} | | |} |
| + | <!--=1=--> |