MicroWorld.eScan.Products.Remote.Command.Execution

description-logoDescription

This indicates an attack attempt against a command-execution vulnerability in MicroWorld eScan Products.
The vulnerability is caused by an error when the vulnerable software handles a malicious POST request. It allows a remote attacker to execute arbitrary code via sending a crafted request.

affected-products-logoAffected Products

The following products versions prior to 4.1.x:
eScan for Linux Desktop
eScan for Linux File Servers
MailScan for Linux Mailservers
WebScan for Linux Proxy Servers

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the patch, available from the vendor's web site:
http://download1.mwti.net/wiki/index.php/Hotfix_-_eScan_for_Linux

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2020-12-02 16.972