home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
ftp.f-secure.com
/
2014.06.ftp.f-secure.com.tar
/
ftp.f-secure.com
/
support
/
hotfix
/
fsig
/
fsigk661-07_readme.txt
< prev
next >
Wrap
Text File
|
2010-11-09
|
4KB
|
106 lines
==========================================================================
Post-Release Fix for
F-Secure Internet Gatekeeper 6.61
Hotfix 7
Copyright (c) 1993-2010 F-Secure Corporation.
All Rights Reserved.
==========================================================================
SUMMARY
This post-release fix is for the following products/versions:
o F-Secure Internet Gatekeeper 6.61
This is cumulative post-release fix and includes following fixes:
o Security vulnerability FSC-2008-1
o Security vulnerability FSC-2008-2
o Security vulnerability FSC-2008-3
o Security vulnerability FSC-2009-1
o Security vulnerability FSC-2010-1
o CTS#70767 Unhandled exception occured on scanning some files
o CTS#74334 Engine crash or malfunction issues
Recommendation: Applying this post-release fix is strongly recommended
TECHNICAL DETAILS
FSC-2008-1 description:
Specially crafted CAB and RAR archives can bypass anti-virus scanning.
For further details please refer to the Security Bulletin:
http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2008-1.html
FSC-2008-2 description:
Specially crafted archives cause product malfunction that may lead to
unhandled exceptions that are visible as product crash, hang and possible
remote code execution.
For further details please refer to the Security Bulletin:
http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2008-2.html
FSC-2008-3 description:
If attackers send specially-made compressed file archives to users,
whose antivirus software is set to scan inside compressed archives,
this causes an integer overflow. The result is a controlled buffer
overflow attack. It allows the attackers to control the computer on
the system level.
For further details please refer to the Security Bulletin:
http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2008-3.html
FSC-2009-1 description:
Specially crafted ZIP and RAR archives can bypass anti-virus scanning.
For further details please refer to the Security Advisory:
http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2009-1.html
FSC-2010-1 description:
Specially crafted GZIP, CAB, and RAR archives can bypass anti-virus scanning.
For further details please refer to the Security Advisory:
http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2010-1.html
CTS#70767 description:
Scanning certain files causes an unhandled exception in the AVP scanning
engine and initiates reloading of the engine. E-mails processed during
this time will produce error messages and will be quarantined.
CTS#74334 description:
The product may fail to scan certain files because one of anti-virus
engines crashes or malfunctions. Consequently this may cause:
o Numerous "Engine malfunction" error messages,
o Creating core dump files, and possibly, excessive disk space consumption,
o Product or system performance issues,
o Decrease in malware detection.
OTHER INFORMATION
This post-release fix includes the following files:
File Name File Version MD5 Checksum
-----------------------------------------------------------------------
AVPFPI.dll 7.0.171.8410 c22b1f8209f3ccd042a69f9a6ce02999
AVPFPI1.dll 7.0.171.8410 c22b1f8209f3ccd042a69f9a6ce02999
AVPFPI2.dll 7.0.171.8410 c22b1f8209f3ccd042a69f9a6ce02999
dffpi.dll 1.2.41.0 ec1f134174a8e08ba162742b33cdb366
fslfpi.dll 2.4.5.0 39dcf0f67038c94eafbbaf12b5c78515
fm4av.dll 4.10.16130.384 d1745b7f5d651d105465570294982ae5
fsavsd.exe 6.75.27.0 b460c73333b543721ef043cc70cacf84
NOTE: Fixes for a particular component are cumulative and contain all
of the previous fixes for that component.
For additional information, please visit F-Secure Support Center at:
http://www.f-secure.com/en_EMEA/support/
HOW TO APPLY THE POSTFIX LOCALLY
o Unpack all files from the package into a temporary folder on the
local machine.
o Open this folder in Windows Explorer and then double-click
"fsigk661-07.fsfix".
o Note: Applying this hotfix does not require a reboot.
-- end of file --