eScan BlogeScan Blog    eScan WebsiteeScan Website    eScan ForumeScan Forum    eScan FeedseScan Feeds     
    
Languages:     

From eScan Wiki

(Difference between revisions)
Jump to: navigation, search
Revision as of 06:57, 12 May 2010
WikiSysop (Talk | contribs)

← Previous diff
Current revision
WikiSysop (Talk | contribs)

Line 2: Line 2:
|- |-
{| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" {| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;"
-|style="text-align:left;"|'''Languages :'''&nbsp;&nbsp;'''·''' [[EPC|<font size=1.5 color="blue">English</font>]]&nbsp;&nbsp;'''·''' [[Escan/latinspanish/protection|<font size=1.5 color="blue">Español</font>]]&nbsp;&nbsp;'''·''' [[Escan/italian/protection|<font size=1.5 color="blue">Italiano</font>]]&nbsp;&nbsp;'''·''' [[Escan/chinese/EPC|<font size=1.5 color="blue">中文(繁體)</font>]]+| style="width:10%; color:#000;" |
 +{| style="width:100px; border:none; background:none;"
 +| [[Image:escan-g.jpg]]
|} |}
-<!--+|style="text-align:left;"|'''·''' [[Escan/english/FAQ-eScan|<font size=1.5 color="blue"
 + 
 +align="left">eScan</font>]]&nbsp;&nbsp;'''·''' [[Escan/english/MailScan-AFT|<font size=1.5
 + 
 +color="blue">MailScan</font>]]&nbsp;&nbsp;'''·''' [[Escan/english/Technologies|<font size=1.5
 + 
 +color="blue">Technologies</font>]]
 +|style="text-align:right;"|&nbsp;&nbsp;'''·''' [[Technical Info|<font size=1.5 color="blue">Technical
 + 
 +Info</font>]]&nbsp;&nbsp;'''·''' [[Escan/english/Security_Awareness|<font size=1.5 color="blue">Security
 + 
 +Awareness</font>]]&nbsp;&nbsp;'''·''' [[User_Guides|<font size=1.5 color="blue">User Guides</font>]]
 +|}
 + 
 +{| class="wikitable" border="0"
 +|}
 +{| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;"
 +|style="text-align:left;"|<font size=3>'''Hotfixes for Linux products'''</font>
 +| style="width:10%; color:#000;" |
 +{| style="width:100px; border:none; background:none;"
 +| [[Image:Linux.jpg|right]]
 +|}
 +|}
 +<br/>
 +__TOC__
 + 
 + 
{| class="wikitable" border="0" {| class="wikitable" border="0"
|- |-
{| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" {| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;"
| style="width:56%; color:#000;" | | style="width:56%; color:#000;" |
-{| style="width:280px; border:none; background:none;"+<!--==1-4-2010==-->
-| [[Image:mwti_logo.gif|left]]+===<B><font size=2>eScan Web Management Console Command Injection</font></B>===
 +:*<B>Release Date:</B>
 +::17th April 2014.
 +{| class="wikitable" border="0" cellspacing="0" width="100%"
 +|-
 +!
 +!
 +|-
 +|width="500pt" valign="top"|
 +*<B>Technical Info:</B>
 +# This hotfix resolves the issue of <br/> Command Injection vulnerability in <br/>eScan Web Management Console<br/> in module MWADMIN version 5.x.
 +|width="500pt"|
 +*<B>How to install this hotfix?</B>
 +# Unzip the escan_mwadmin_patch.zip. All the file will be extracted to escan_mwadmin_patch directory,.<br/>
 +# Go to escan_mwadmin_patch directory and execute the install.sh (root permission is required to execute this script)<br/>
 + #./install.sh
 +<br/>
 +|}
 +{| class="wikitable" border="0" cellspacing="0" width="100%"
 +|-
 +!
 +!
 +!
 +|-
 +|width="500pt"|
 +* <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/escan_mwadmin_patch.zip Click here to download the hotfix]</span></B>
 +<br/>
|} |}
---> 
-{| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;text-align:left;" 
-|width="1000pt" style="width:18%; font-size:95%;text-align:left;white-space:nowrap;"|  
-<B>General</B> 
-* [http://www.mwti.net/<font color="blue">MicroWorld Website</font>] 
-* [[Main Page|<font color="blue">MicroWorld WIKI</font>]] 
-* [[Marketing|<font color="blue">Marketing</font>]] 
-* [[Events|<font color="blue">Events</font>]] 
-* [[Marketing/Advertisement|<font color="blue">Advertisement</font>]] 
-|width="1000pt" style="width:18%; font-size:95%;text-align:left;white-space:nowrap;"|  
-<B>Knowledgebase</B> 
-* [[Technical Info|<font color="blue">Technical Information</font>]] 
-* [[Beta Testing|<font color="blue">Beta Testing</font>]] 
-* [[Release Candidate|<font color="blue">Release Candidate</font>]] 
-* [[User Guide|<font color="blue">User Guides</font>]] 
-|width="1000pt" style="width:18%; font-size:95%;text-align:left;white-space:nowrap;"|  
-<B> Support </B> 
-* [[EMail|<font color="blue">eMail</font>]] 
-* [[Online Chat|<font color="blue">Online Chat</font>]] 
-* [[Telephonic Support|<font color="blue">Telephone</font>]] 
-* [[Remote Support|<font color="blue">Remote Support</font>]] 
-* [[Forums|<font color="blue">Forums</font>]] 
|} |}
 +<!--=1=-->
 +
 +
{| class="wikitable" border="0" {| class="wikitable" border="0"
|- |-
{| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" {| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;"
-|style="text-align:left;"|<font size=3>'''Hotfixes for Linux products'''</font>+| style="width:56%; color:#000;" |
-| style="width:10%; color:#000;" |+===<B><font size=2> Clam AV service in MicroWorld products for Linux does not start after updates</font></B>===
-{| style="width:100px; border:none; background:none;"+:*<B>Release Date:</B>
-| [[Image:Linux.jpg|right]]+::3rd May 2010.
 +{| class="wikitable" border="0" cellspacing="0" width="100%"
 +|-
 +!
 +!
 +|-
 +|width="500pt"|
 +*<B>Technical Info:</B>
 +# This hotfix resolves the issue of CLAM AV service, in MicroWorld product for<br/> Linux, either stops or does not restarts after downloading the latest AV updates.
 +# This hotfix will upgrade to the latest version of CLAM AV engine in MicroWorld <br/>products for</br> Linux.
 +# [[Announcements|<B>Click here to read the Announcements</B>]]
 + 
 + 
 + 
 + 
 + 
 + 
 + 
 +|width="500pt"|
 +*<B>How to install this hotfix?</B>
 +# Extract the mwcav_hotfix_<linux-release-version>.zip
 +# Go to extracted directory mwcav_hotfix_<linux-release-version>
 +# Run ./install.sh and patch will be applied successfully,
 +# Then update the Clam av from the Web-Administration,
 +# Restart the Clam antivirus service either from the Web-Administration or by the below command from the terminal:
 +::<B>/opt/MicroWorld/etc/init.d/mwcav start</B>
|} |}
 +{| class="wikitable" border="0" cellspacing="0" width="100%"
 +|-
 +!
 +!
 +|-
 +|width="100%" |
 +<B>Download Hotfix for: </B>
 +{|width="15%"
 +|
 +* <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/mwcav_hotfix_rh9.zip Redhat 9]</span></B><br/>
 +||
 +* <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/mwcav_hotfix_sles9.zip SLES 9]</span></B><br/>
 +|-
 +|
 +* <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/mwcav_hotfix_rhel3.zip RHEL 3]</span></B><br/>
 +||
 +|-
 +|
 +* <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/mwcav_hotfix_rhel5.zip RHEL 5]</span></B><br/>
|} |}
-__NOTOC__+<B><U>Note:</U></B><br/>
 +If you do not find the hotfix for your Linux distro, write to us at linux@escanav.com<br/> or support@escanav.com with the below details:
 +# Product Name [eScan (Desktop or File Servers) / MailScan / WebScan] and<br/> product version,
 +# Linux Distribution name and release version (32 bit or 64 bit),
 +# Linux kernel version.
 +|width="500pt"|
 +|}
 +|}
 + 
 + 
 + 
{| class="wikitable" border="0" {| class="wikitable" border="0"
|- |-
{| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" {| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;"
| style="width:56%; color:#000;" | | style="width:56%; color:#000;" |
-* <B> Hotfix for Base Package - MWADMIN</B>+<!--==1-4-2010==-->
 +===<B><font size=2>Remote Command Execution Vulnerability in MWADMIN version <= 4.1.x </font></B>===
:*<B>Release Date:</B> :*<B>Release Date:</B>
-::01st April 2010.+::1st April 2010.
{| class="wikitable" border="0" cellspacing="0" width="100%" {| class="wikitable" border="0" cellspacing="0" width="100%"
|- |-
Line 59: Line 149:
|- |-
|width="500pt"| |width="500pt"|
-:*<B>Technical Info:</B>+*<B>Technical Info:</B>
-::<B>1)</B> This hotfix, for the base Package - MWADMIN, resolves the Remote Command Execution Vulnerability issue reported in prior versions 4.1.x of MWADMIN package.+# This hotfix, for the base Package - MWADMIN, resolves the Remote Command<br/> Execution Vulnerability issue reported in prior versions 4.1.x of MWADMIN <br/>package.
- +# This hotfix is required to be applied in the below products where the version<br/> of MWADMIN is less than 4.1.x
-::<B>2)</B> This hotfix is required to be applied in the below products where the version of MWADMIN is less than 4.1.x+:*eScan for Linux Desktop
-:::*eScan for Linux Desktop+:*eScan for Linux File Servers
-:::*eScan for Linux File Servers+:*MailScan for Linux Mailservers
-:::*MailScan for Linux Mailservers+:*WebScan for Linux Proxy Servers
-:::*WebScan for Linux Proxy Servers+
|width="500pt"| |width="500pt"|
-:*<B>How to install the hotfix for Base Package - MWADMIN?</B>+*<B>How to install this hotfix?</B>
-:::<B>1)</B> Extract the es_hotfix_1.zip or the es_hotfix_1_fp.zip (as per the linux distributions listed below).+# Extract the es_hotfix_1.zip or the es_hotfix_1_fp.zip <br/>(as per the linux distributions listed below).<br/>
-:::<B>2)</B> Go to es_hotfix_1 directory (for es_hotfix_1.zip)+# Go to es_hotfix_1 directory (for es_hotfix_1.zip)<br/><B>OR</B><br/>es_hotfix_1_fp directory (for es_hotfix_1_fp.zip)
-::::<B>OR</B> +# Run ./install.sh and patch will be applied successfully.
-::::es_hotfix_1_fp directory (for es_hotfix_1_fp.zip)+
-:::<B>3)</B> Run ./install.sh and patch will be applied successfully.+
Line 102: Line 189:
:* SLES 10 :* SLES 10
:* SLES 10.2 (64 bit) :* SLES 10.2 (64 bit)
 +
Line 114: Line 202:
|} |}
|} |}
 +<!--=1=-->

Current revision

Image:escan-g.jpg
· eScan  · MailScan  · Technologies   · Technical Info  · Security Awareness  · User Guides
Hotfixes for Linux products


Contents


eScan Web Management Console Command Injection

  • Release Date:
17th April 2014.
  • Technical Info:
  1. This hotfix resolves the issue of
    Command Injection vulnerability in
    eScan Web Management Console
    in module MWADMIN version 5.x.
  • How to install this hotfix?
  1. Unzip the escan_mwadmin_patch.zip. All the file will be extracted to escan_mwadmin_patch directory,.
  2. Go to escan_mwadmin_patch directory and execute the install.sh (root permission is required to execute this script)
       #./install.sh




Clam AV service in MicroWorld products for Linux does not start after updates

  • Release Date:
3rd May 2010.
  • Technical Info:
  1. This hotfix resolves the issue of CLAM AV service, in MicroWorld product for
    Linux, either stops or does not restarts after downloading the latest AV updates.
  2. This hotfix will upgrade to the latest version of CLAM AV engine in MicroWorld
    products for</br> Linux.
  3. Click here to read the Announcements




  • How to install this hotfix?
  1. Extract the mwcav_hotfix_<linux-release-version>.zip
  2. Go to extracted directory mwcav_hotfix_<linux-release-version>
  3. Run ./install.sh and patch will be applied successfully,
  4. Then update the Clam av from the Web-Administration,
  5. Restart the Clam antivirus service either from the Web-Administration or by the below command from the terminal:
/opt/MicroWorld/etc/init.d/mwcav start

Download Hotfix for:

Note:
If you do not find the hotfix for your Linux distro, write to us at linux@escanav.com
or support@escanav.com with the below details:

  1. Product Name [eScan (Desktop or File Servers) / MailScan / WebScan] and
    product version,
  2. Linux Distribution name and release version (32 bit or 64 bit),
  3. Linux kernel version.


Remote Command Execution Vulnerability in MWADMIN version <= 4.1.x

  • Release Date:
1st April 2010.
  • Technical Info:
  1. This hotfix, for the base Package - MWADMIN, resolves the Remote Command
    Execution Vulnerability issue reported in prior versions 4.1.x of MWADMIN
    package.
  2. This hotfix is required to be applied in the below products where the version
    of MWADMIN is less than 4.1.x
  • eScan for Linux Desktop
  • eScan for Linux File Servers
  • MailScan for Linux Mailservers
  • WebScan for Linux Proxy Servers
  • How to install this hotfix?
  1. Extract the es_hotfix_1.zip or the es_hotfix_1_fp.zip
    (as per the linux distributions listed below).
  2. Go to es_hotfix_1 directory (for es_hotfix_1.zip)
    OR
    es_hotfix_1_fp directory (for es_hotfix_1_fp.zip)
  3. Run ./install.sh and patch will be applied successfully.



  • Debian 5.0.3
  • Fedora Core 6
  • Fedora 8
  • Fedora 9
  • RHEL 5 (32 bit & 64 bit)
  • Slackware 12.3
  • SLES 10.2
  • SLES 11
  • Ubuntu 8.10
  • Ubuntu 9.10
  • Fedora Core 3
  • RHEL 4
  • SLES 10
  • SLES 10.2 (64 bit)







eScan Copyright © 2015 MicroWorld Technologies Inc.- AntiVirus & Content Security.       Send your feedback to solutions@escanav.com eScan Wiki

    Privacy policy  About eScan Wiki  Disclaimers   This page has been accessed 91,809 times.