MicroWorld.eScan.Products.Remote.Command.Execution
Description
This indicates an attack attempt against a command-execution vulnerability in MicroWorld eScan Products.
The vulnerability is caused by an error when the vulnerable software handles a malicious POST request. It allows a remote attacker to execute arbitrary code via sending a crafted request.
Affected Products
The following products versions prior to 4.1.x:
eScan for Linux Desktop
eScan for Linux File Servers
MailScan for Linux Mailservers
WebScan for Linux Proxy Servers
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the patch, available from the vendor's web site:
http://download1.mwti.net/wiki/index.php/Hotfix_-_eScan_for_Linux
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2020-12-02 | 16.972 |