Intrusion Prevention

MicroWorld.eScan.Products.Remote.Command.Execution

Description

This indicates an attack attempt against a command-execution vulnerability in MicroWorld eScan Products.
The vulnerability is caused by an error when the vulnerable software handles a malicious POST request. It allows a remote attacker to execute arbitrary code via sending a crafted request.

Affected Products

The following products versions prior to 4.1.x:
eScan for Linux Desktop
eScan for Linux File Servers
MailScan for Linux Mailservers
WebScan for Linux Proxy Servers

Impact

System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Apply the patch, available from the vendor's web site:
http://download1.mwti.net/wiki/index.php/Hotfix_-_eScan_for_Linux