Revision as of 08:35, 4 June 2010 WikiSysop (Talk | contribs)
← Previous diff |
Current revision WikiSysop (Talk | contribs)
|
| Line 1: |
Line 1: |
| | {| class="wikitable" border="0" | | {| class="wikitable" border="0" |
| - | | + | |- |
| - | {| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | + | |
| - | | style="width:56%; color:#000;" | | + | |
| - | {| style="width:280px; border:none; background:none;" | + | |
| - | | [[Image:Escan_wikipedia.jpg|left|<!--We add confidence to computing-->]] | + | |
| - | |} | + | |
| - | |width="1000pt" style="width:11%; font-size:95%;" white-space:nowrap;| | + | |
| - | <B>General</B> | + | |
| - | * [[Main Page|<font color="blue">Home</font>]] | + | |
| - | * [[Marketing|<font color="blue">Marketing</font>]] | + | |
| - | * [[Events|<font color="blue">Events</font>]] | + | |
| - | * [[Marketing/Advertisement|<font color="blue">Advertisement</font>]] | + | |
| - | |width="1000pt" style="width:11%; font-size:95%; white-space:nowrap;" | | + | |
| - | <B>Knowledgebase</B> | + | |
| - | * [[Technical Info|<font color="blue">Technical Information</font>]] | + | |
| - | * [[Beta Testing|<font color="blue">Beta Testing</font>]] | + | |
| - | * [[Release Candidate|<font color="blue">Release Candidate</font>]] | + | |
| - | * [[User Guide|<font color="blue">User Guides</font>]] | + | |
| - | |width="1000pt" style="width:11%; font-size:95%;white-space:nowrap;" | | + | |
| - | <B><p> Support</p></B> | + | |
| - | * [[EMail|<font color="blue">eMail</font>]] | + | |
| - | * [[Online Chat|<font color="blue">Online Chat</font>]] | + | |
| - | * [[Telephonic Support|<font color="blue">Telephone</font>]] | + | |
| - | * [[Remote Support|<font color="blue">Remote Support</font>]] | + | |
| - | * [[Forums|<font color="blue">Forums</font>]] | + | |
| - | |} | + | |
| - | {| class="wikitable" border="0" | + | |
| - | |} | + | |
| - | | + | |
| | {| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | | {| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" |
| | | style="width:10%; color:#000;" | | | | style="width:10%; color:#000;" | |
| Line 34: |
Line 6: |
| | | [[Image:escan-g.jpg]] | | | [[Image:escan-g.jpg]] |
| | |} | | |} |
| - | |style="text-align:left;"| '''·''' [[Online Guide - Escan for Linux Desktop|<font size=1.5 color="blue">FAQ</font>]] | + | |style="text-align:left;"|'''·''' [[Escan/english/FAQ-eScan|<font size=1.5 color="blue" |
| - | |style="text-align:right;"| '''·''' [[Technical Info|<font size=1.5 color="blue">Technical Information - Main Page</font>]] | + | |
| | + | align="left">eScan</font>]] '''·''' [[Escan/english/MailScan-AFT|<font size=1.5 |
| | + | |
| | + | color="blue">MailScan</font>]] '''·''' [[Escan/english/Technologies|<font size=1.5 |
| | + | |
| | + | color="blue">Technologies</font>]] |
| | + | |style="text-align:right;"| '''·''' [[Technical Info|<font size=1.5 color="blue">Technical |
| | + | |
| | + | Info</font>]] '''·''' [[Escan/english/Security_Awareness|<font size=1.5 color="blue">Security |
| | + | |
| | + | Awareness</font>]] '''·''' [[User_Guides|<font size=1.5 color="blue">User Guides</font>]] |
| | |} | | |} |
| | | | |
| Line 49: |
Line 31: |
| | <br/> | | <br/> |
| | __TOC__ | | __TOC__ |
| | + | |
| | + | |
| | {| class="wikitable" border="0" | | {| class="wikitable" border="0" |
| | |- | | |- |
| Line 54: |
Line 38: |
| | | style="width:56%; color:#000;" | | | | style="width:56%; color:#000;" | |
| | <!--==1-4-2010==--> | | <!--==1-4-2010==--> |
| - | ===<B><font size=2>Remote Command Execution Vulnerability in MWADMIN version <= 4.1.x </font></B>=== | + | ===<B><font size=2>eScan Web Management Console Command Injection</font></B>=== |
| | :*<B>Release Date:</B> | | :*<B>Release Date:</B> |
| - | ::1st April 2010. | + | ::17th April 2014. |
| | {| class="wikitable" border="0" cellspacing="0" width="100%" | | {| class="wikitable" border="0" cellspacing="0" width="100%" |
| | |- | | |- |
| Line 62: |
Line 46: |
| | ! | | ! |
| | |- | | |- |
| - | |width="500pt"| | + | |width="500pt" valign="top"| |
| | *<B>Technical Info:</B> | | *<B>Technical Info:</B> |
| - | # This hotfix, for the base Package - MWADMIN, resolves the Remote Command<br/> Execution Vulnerability issue reported in prior versions 4.1.x of MWADMIN <br/>package. | + | # This hotfix resolves the issue of <br/> Command Injection vulnerability in <br/>eScan Web Management Console<br/> in module MWADMIN version 5.x. |
| - | # This hotfix is required to be applied in the below products where the version<br/> of MWADMIN is less than 4.1.x | + | |
| - | :*eScan for Linux Desktop | + | |
| - | :*eScan for Linux File Servers | + | |
| - | :*MailScan for Linux Mailservers | + | |
| - | :*WebScan for Linux Proxy Servers | + | |
| | |width="500pt"| | | |width="500pt"| |
| | *<B>How to install this hotfix?</B> | | *<B>How to install this hotfix?</B> |
| - | # Extract the es_hotfix_1.zip or the es_hotfix_1_fp.zip <br/>(as per the linux distributions listed below).<br/> | + | # Unzip the escan_mwadmin_patch.zip. All the file will be extracted to escan_mwadmin_patch directory,.<br/> |
| - | # Go to es_hotfix_1 directory (for es_hotfix_1.zip)<br/><B>OR</B><br/>es_hotfix_1_fp directory (for es_hotfix_1_fp.zip) | + | # Go to escan_mwadmin_patch directory and execute the install.sh (root permission is required to execute this script)<br/> |
| - | # Run ./install.sh and patch will be applied successfully. | + | #./install.sh |
| - | | + | <br/> |
| - | | + | |
| - | | + | |
| - | | + | |
| | |} | | |} |
| | {| class="wikitable" border="0" cellspacing="0" width="100%" | | {| class="wikitable" border="0" cellspacing="0" width="100%" |
| | |- | | |- |
| | + | ! |
| | ! | | ! |
| | ! | | ! |
| | |- | | |- |
| | |width="500pt"| | | |width="500pt"| |
| - | * <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/es_hotfix_1.zip Click here to download the Hotfix for the following Linux distributions:]</span></B> | + | * <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/escan_mwadmin_patch.zip Click here to download the hotfix]</span></B> |
| - | :* Debian 5.0.3 | + | <br/> |
| - | :* Fedora Core 6 | + | |} |
| - | :* Fedora 8 | + | |} |
| - | :* Fedora 9 | + | <!--=1=--> |
| - | :* RHEL 5 (32 bit & 64 bit) | + | |
| - | :* Slackware 12.3 | + | |
| - | :* SLES 10.2 | + | |
| - | :* SLES 11 | + | |
| - | :* Ubuntu 8.10 | + | |
| - | :* Ubuntu 9.10 | + | |
| - | |width="500pt"| | + | |
| - | * <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/es_hotfix_1_fp.zip Click here to download the Hotfix for the following Linux distributions]</span></B> | + | |
| - | :* Fedora Core 3 | + | |
| - | :* RHEL 4 | + | |
| - | :* SLES 10 | + | |
| - | :* SLES 10.2 (64 bit) | + | |
| | | | |
| | | | |
| | | | |
| - | | |
| - | | |
| - | | |
| - | | |
| - | | |
| - | | |
| - | | |
| - | | |
| - | |} | |
| - | |} | |
| - | <!--=1=--> | |
| | {| class="wikitable" border="0" | | {| class="wikitable" border="0" |
| | |- | | |- |
| Line 178: |
Line 132: |
| | |} | | |} |
| | |} | | |} |
| | + | |
| | + | |
| | + | |
| | + | {| class="wikitable" border="0" |
| | + | |- |
| | + | {| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" |
| | + | | style="width:56%; color:#000;" | |
| | + | <!--==1-4-2010==--> |
| | + | ===<B><font size=2>Remote Command Execution Vulnerability in MWADMIN version <= 4.1.x </font></B>=== |
| | + | :*<B>Release Date:</B> |
| | + | ::1st April 2010. |
| | + | {| class="wikitable" border="0" cellspacing="0" width="100%" |
| | + | |- |
| | + | ! |
| | + | ! |
| | + | |- |
| | + | |width="500pt"| |
| | + | *<B>Technical Info:</B> |
| | + | # This hotfix, for the base Package - MWADMIN, resolves the Remote Command<br/> Execution Vulnerability issue reported in prior versions 4.1.x of MWADMIN <br/>package. |
| | + | # This hotfix is required to be applied in the below products where the version<br/> of MWADMIN is less than 4.1.x |
| | + | :*eScan for Linux Desktop |
| | + | :*eScan for Linux File Servers |
| | + | :*MailScan for Linux Mailservers |
| | + | :*WebScan for Linux Proxy Servers |
| | + | |width="500pt"| |
| | + | *<B>How to install this hotfix?</B> |
| | + | # Extract the es_hotfix_1.zip or the es_hotfix_1_fp.zip <br/>(as per the linux distributions listed below).<br/> |
| | + | # Go to es_hotfix_1 directory (for es_hotfix_1.zip)<br/><B>OR</B><br/>es_hotfix_1_fp directory (for es_hotfix_1_fp.zip) |
| | + | # Run ./install.sh and patch will be applied successfully. |
| | + | |
| | + | |
| | + | |
| | + | |
| | + | |} |
| | + | {| class="wikitable" border="0" cellspacing="0" width="100%" |
| | + | |- |
| | + | ! |
| | + | ! |
| | + | |- |
| | + | |width="500pt"| |
| | + | * <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/es_hotfix_1.zip Click here to download the Hotfix for the following Linux distributions:]</span></B> |
| | + | :* Debian 5.0.3 |
| | + | :* Fedora Core 6 |
| | + | :* Fedora 8 |
| | + | :* Fedora 9 |
| | + | :* RHEL 5 (32 bit & 64 bit) |
| | + | :* Slackware 12.3 |
| | + | :* SLES 10.2 |
| | + | :* SLES 11 |
| | + | :* Ubuntu 8.10 |
| | + | :* Ubuntu 9.10 |
| | + | |width="500pt"| |
| | + | * <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/es_hotfix_1_fp.zip Click here to download the Hotfix for the following Linux distributions]</span></B> |
| | + | :* Fedora Core 3 |
| | + | :* RHEL 4 |
| | + | :* SLES 10 |
| | + | :* SLES 10.2 (64 bit) |
| | + | |
| | + | |
| | + | |
| | + | |
| | + | |
| | + | |
| | + | |
| | + | |
| | + | |
| | + | |
| | + | |
| | + | |} |
| | + | |} |
| | + | <!--=1=--> |