Intrusion Prevention



This indicates an attack attempt against a command-execution vulnerability in MicroWorld eScan Products.
The vulnerability is caused by an error when the vulnerable software handles a malicious POST request. It allows a remote attacker to execute arbitrary code via sending a crafted request.

Affected Products

The following products versions prior to 4.1.x:
eScan for Linux Desktop
eScan for Linux File Servers
MailScan for Linux Mailservers
WebScan for Linux Proxy Servers


System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Apply the patch, available from the vendor's web site: