![]() Improved: Product update notifications.Fixed: VC 14 Redistributable installation issue.Fixed: Upgrade issue from Suite to Extreme.Check Point would like to thank Florian Bogner for discovering the issue and bringing it to the attention of Check Point.Fixed: A local privilege escalation attack in Anti-Virus.New: Support for Windows 10 Creator’s Update.Improved: Compatibility with Microsoft Meltdown/Spectre security updates. ![]() Improved: Integration with Windows Defender Security Center.New: Support for Windows 10 Spring Update 1803.Check Point would like to thank Jakub Palaczynski for reporting the issues.Doing this on files with limited access gains the local attacker higher privileges to the file. Fix for CVE-2019-8455: A hard-link created from the log file of Check Point ZoneAlarm up to 15.4.062 to any file on the system will get its permission changed so that all users can access that linked file.This can allow a local attacker to replace a DLL file with a malicious one and cause Denial of Service to the client. Fix for CVE-2019-8453: Some of the DLLs loaded by Check Point ZoneAlarm up to 15.4.062 are taken from directories where all users have write permissions.New: Web Secure, blocks phishing attacks and safely download documents in Chrome.New: Antivirus SDK with better protections.Fixed: For CVE-2020-6013 - Insecure directory privileges allow for a local escalation of privilege on systems not patched with Microsoft CVE-2020-00896. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |