From eScan Wiki
(Difference between revisions)
Revision as of 02:29, 17 April 2014 WikiSysop (Talk | contribs)
← Previous diff |
Current revision WikiSysop (Talk | contribs)
|
Line 31: |
Line 31: |
| <br/> | | <br/> |
| __TOC__ | | __TOC__ |
| + | |
| + | |
| + | {| class="wikitable" border="0" |
| + | |- |
| + | {| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" |
| + | | style="width:56%; color:#000;" | |
| + | <!--==1-4-2010==--> |
| + | ===<B><font size=2>eScan Web Management Console Command Injection</font></B>=== |
| + | :*<B>Release Date:</B> |
| + | ::17th April 2014. |
| + | {| class="wikitable" border="0" cellspacing="0" width="100%" |
| + | |- |
| + | ! |
| + | ! |
| + | |- |
| + | |width="500pt" valign="top"| |
| + | *<B>Technical Info:</B> |
| + | # This hotfix resolves the issue of <br/> Command Injection vulnerability in <br/>eScan Web Management Console<br/> in module MWADMIN version 5.x. |
| + | |width="500pt"| |
| + | *<B>How to install this hotfix?</B> |
| + | # Unzip the escan_mwadmin_patch.zip. All the file will be extracted to escan_mwadmin_patch directory,.<br/> |
| + | # Go to escan_mwadmin_patch directory and execute the install.sh (root permission is required to execute this script)<br/> |
| + | #./install.sh |
| + | <br/> |
| + | |} |
| + | {| class="wikitable" border="0" cellspacing="0" width="100%" |
| + | |- |
| + | ! |
| + | ! |
| + | ! |
| + | |- |
| + | |width="500pt"| |
| + | * <B><span class="plainlinks neverexpand">[http://www.microworldsystems.com/download/linux/hotfix/escan_mwadmin_patch.zip Click here to download the hotfix]</span></B> |
| + | <br/> |
| + | |} |
| + | |} |
| + | <!--=1=--> |
| + | |
| + | |
| | | |
| {| class="wikitable" border="0" | | {| class="wikitable" border="0" |
Current revision
Hotfixes for Linux products
|
|
eScan Web Management Console Command Injection
-
- 17th April 2014.
|
|
- This hotfix resolves the issue of
Command Injection vulnerability in eScan Web Management Console in module MWADMIN version 5.x.
|
- How to install this hotfix?
- Unzip the escan_mwadmin_patch.zip. All the file will be extracted to escan_mwadmin_patch directory,.
- Go to escan_mwadmin_patch directory and execute the install.sh (root permission is required to execute this script)
#./install.sh
|
|
Clam AV service in MicroWorld products for Linux does not start after updates
-
- 3rd May 2010.
|
|
- This hotfix resolves the issue of CLAM AV service, in MicroWorld product for
Linux, either stops or does not restarts after downloading the latest AV updates.
- This hotfix will upgrade to the latest version of CLAM AV engine in MicroWorld
products for</br> Linux.
- Click here to read the Announcements
|
- How to install this hotfix?
- Extract the mwcav_hotfix_<linux-release-version>.zip
- Go to extracted directory mwcav_hotfix_<linux-release-version>
- Run ./install.sh and patch will be applied successfully,
- Then update the Clam av from the Web-Administration,
- Restart the Clam antivirus service either from the Web-Administration or by the below command from the terminal:
- /opt/MicroWorld/etc/init.d/mwcav start
|
|
|
Download Hotfix for:
Note:
If you do not find the hotfix for your Linux distro, write to us at linux@escanav.com or support@escanav.com with the below details:
- Product Name [eScan (Desktop or File Servers) / MailScan / WebScan] and
product version,
- Linux Distribution name and release version (32 bit or 64 bit),
- Linux kernel version.
|
|
|
Remote Command Execution Vulnerability in MWADMIN version <= 4.1.x
-
- 1st April 2010.
|
|
- This hotfix, for the base Package - MWADMIN, resolves the Remote Command
Execution Vulnerability issue reported in prior versions 4.1.x of MWADMIN package.
- This hotfix is required to be applied in the below products where the version
of MWADMIN is less than 4.1.x
- eScan for Linux Desktop
- eScan for Linux File Servers
- MailScan for Linux Mailservers
- WebScan for Linux Proxy Servers
|
- How to install this hotfix?
- Extract the es_hotfix_1.zip or the es_hotfix_1_fp.zip
(as per the linux distributions listed below).
- Go to es_hotfix_1 directory (for es_hotfix_1.zip)
OR es_hotfix_1_fp directory (for es_hotfix_1_fp.zip)
- Run ./install.sh and patch will be applied successfully.
|
|
|
- Debian 5.0.3
- Fedora Core 6
- Fedora 8
- Fedora 9
- RHEL 5 (32 bit & 64 bit)
- Slackware 12.3
- SLES 10.2
- SLES 11
- Ubuntu 8.10
- Ubuntu 9.10
|
- Fedora Core 3
- RHEL 4
- SLES 10
- SLES 10.2 (64 bit)
|
|