A vulnerability in the NAI PGP Outlook plug-in can be exploited to remotely execute code on any system that uses the NAI PGP Outlook plug-ins.
Use this version of the pattern file for all Trend Micro products running on Intel or DEC Alpha based operating systems and for products using Trend’s virus scanning API Library. Because more than 200 new viruses are discovered every month, it is strongly suggested that you update your virus pattern files regularly.
Homepage
Download
Homepage
Download
Virus definition, or .DAT, files contain up-to-date virus signatures and other information that Network Associates anti-virus products use to protect your computer against the thousands of computer viruses in circulation. Network Associates releases new .DAT files regularly to provide protection against the approximately 300 new viruses that appear each month. To ensure that your anti-virus software can protect your system or network against the latest virus threats, download and install the latest .DAT files.
Homepage
Download
Homepage
Download
This is the latest virus pattern to detect the latest viruses. This update will work on the following products: NAV 2000 for Win9x/NT/2000,
NAV 2001 for Win95b/98/NT/2000/Me,
NAV 2002 Professional Edition,
NAV 2002 for Win98/Me/NT/2000/XP Home/XP Pro,
NAV 4.0 for Windows 3.51,
NAV 5.0 and 2000 for Win9x,
NAV 5.0 and 2000 for WinNT,
NAV for Firewalls 1.5 or higher,
NAV for Lotus Notes (Intel),
NAV for MS Exchange (Intel),
Norton SystemWorks (all versions),
Norton Utilities for Windows 95/98 (all versions),
pcAnywhere32 7.5 and higher for WinNT.
Homepage
Download
NAV 2001 for Win95b/98/NT/2000/Me,
NAV 2002 Professional Edition,
NAV 2002 for Win98/Me/NT/2000/XP Home/XP Pro,
NAV 4.0 for Windows 3.51,
NAV 5.0 and 2000 for Win9x,
NAV 5.0 and 2000 for WinNT,
NAV for Firewalls 1.5 or higher,
NAV for Lotus Notes (Intel),
NAV for MS Exchange (Intel),
Norton SystemWorks (all versions),
Norton Utilities for Windows 95/98 (all versions),
pcAnywhere32 7.5 and higher for WinNT.
Homepage
Download
Virus definition, or .DAT, files contain up-to-date virus signatures and other information that Network Associates anti-virus products use to protect your computer against the thousands of computer viruses in circulation. Network Associates releases new .DAT files regularly to provide protection against the approximately 300 new viruses that appear each month. To ensure that your anti-virus software can protect your system or network against the latest virus threats, download and install the latest .DAT files.
Homepage
Download
Homepage
Download
Microsoft has released another security patch for SQL Server:
When installing SQL Server 7.0 (including MSDE 1.0), SQL Server 2000, or a service pack for SQL Server 7.0 or SQL Server 2000, the information provided for the install process is collected and stored in a setup file called setup.iss. The setup.iss file can then be
used to automate the installation of additional SQL Server systems. SQL Server 2000 also includes the ability to record an unattended install to the setup.iss file without having to actually perform an
installation. The administrator setting up the SQL Server can supply a password to the installation routine under the following circumstances:
- If the SQL Server is being set up in Mixed Mode, a password for the SQL Server administrator (the sa account) must be supplied.
- Whether in Mixed Mode or Windows Authentication Mode, a User ID and password can optionally be supplied for the purpose of starting up SQL Server service accounts.
In either case, the password would be stored in the setup.iss file. Prior to SQL Server 7.0 Service Pack 4, the passwords were stored in clear text. For SQL Server 7.0 Service Pack 4 and SQL Server 2000 Service Packs 1 and 2, the passwords are encrypted and then stored.
Additionally, a log file is created during the installation process that shows the results of the installation. The log file would also include any passwords that had been stored in the setup.iss file.
Read more
When installing SQL Server 7.0 (including MSDE 1.0), SQL Server 2000, or a service pack for SQL Server 7.0 or SQL Server 2000, the information provided for the install process is collected and stored in a setup file called setup.iss. The setup.iss file can then be
used to automate the installation of additional SQL Server systems. SQL Server 2000 also includes the ability to record an unattended install to the setup.iss file without having to actually perform an
installation. The administrator setting up the SQL Server can supply a password to the installation routine under the following circumstances:
- If the SQL Server is being set up in Mixed Mode, a password for the SQL Server administrator (the sa account) must be supplied.
- Whether in Mixed Mode or Windows Authentication Mode, a User ID and password can optionally be supplied for the purpose of starting up SQL Server service accounts.
In either case, the password would be stored in the setup.iss file. Prior to SQL Server 7.0 Service Pack 4, the passwords were stored in clear text. For SQL Server 7.0 Service Pack 4 and SQL Server 2000 Service Packs 1 and 2, the passwords are encrypted and then stored.
Additionally, a log file is created during the installation process that shows the results of the installation. The log file would also include any passwords that had been stored in the setup.iss file.
Read more
Microsoft has released a new cumulative patch for SQL Server 2000:
This is a cumulative patch that includes the functionality of all previously released patches for SQL Server 2000. In addition, it eliminates three newly discovered vulnerabilities affecting SQL Server 2000 and MSDE 2000 (but not any previous versions of SQL Server or MSDE):
- A buffer overrun vulnerability in a procedure used to encrypt SQL Server credential information. An attacker who was able to successfully exploit this vulnerability could gain significant control over the database and possibly the server itself depending on the account SQL server runs as.
- A buffer overrun vulnerability in a procedure that relates to the bulk inserting of data in SQL Server tables. An attacker who was able to successfully exploit this vulnerability could gain significant control over the database and possibly the server itself.
- A privilege elevation vulnerability that results because of incorrect permissions on the Registry key that stores the SQL Server service account information. An attacker who was able to successfully exploit this vulnerability could gain greater privileges on the system than had been granted by the system administrator potentially even the same rights as the operating system.
Read more
This is a cumulative patch that includes the functionality of all previously released patches for SQL Server 2000. In addition, it eliminates three newly discovered vulnerabilities affecting SQL Server 2000 and MSDE 2000 (but not any previous versions of SQL Server or MSDE):
- A buffer overrun vulnerability in a procedure used to encrypt SQL Server credential information. An attacker who was able to successfully exploit this vulnerability could gain significant control over the database and possibly the server itself depending on the account SQL server runs as.
- A buffer overrun vulnerability in a procedure that relates to the bulk inserting of data in SQL Server tables. An attacker who was able to successfully exploit this vulnerability could gain significant control over the database and possibly the server itself.
- A privilege elevation vulnerability that results because of incorrect permissions on the Registry key that stores the SQL Server service account information. An attacker who was able to successfully exploit this vulnerability could gain greater privileges on the system than had been granted by the system administrator potentially even the same rights as the operating system.
Read more
Use this version of the pattern file for all Trend Micro products running on Intel or DEC Alpha based operating systems and for products using Trend’s virus scanning API Library. Because more than 200 new viruses are discovered every month, it is strongly suggested that you update your virus pattern files regularly.
Homepage
Download
Homepage
Download
Winamp is vulnerable to a buffer overflow condition when checking for updated versions. A malicious server located at www.winamp.com may return a malicious response. Exploitation may result in the execution of arbitrary code as the Winamp process.
Read more
Read more
This is the latest virus pattern to detect the latest viruses. This update will work on the following products: NAV 2000 for Win9x/NT/2000,
NAV 2001 for Win95b/98/NT/2000/Me,
NAV 2002 Professional Edition,
NAV 2002 for Win98/Me/NT/2000/XP Home/XP Pro,
NAV 4.0 for Windows 3.51,
NAV 5.0 and 2000 for Win9x,
NAV 5.0 and 2000 for WinNT,
NAV for Firewalls 1.5 or higher,
NAV for Lotus Notes (Intel),
NAV for MS Exchange (Intel),
Norton SystemWorks (all versions),
Norton Utilities for Windows 95/98 (all versions),
pcAnywhere32 7.5 and higher for WinNT.
Homepage
Download
NAV 2001 for Win95b/98/NT/2000/Me,
NAV 2002 Professional Edition,
NAV 2002 for Win98/Me/NT/2000/XP Home/XP Pro,
NAV 4.0 for Windows 3.51,
NAV 5.0 and 2000 for Win9x,
NAV 5.0 and 2000 for WinNT,
NAV for Firewalls 1.5 or higher,
NAV for Lotus Notes (Intel),
NAV for MS Exchange (Intel),
Norton SystemWorks (all versions),
Norton Utilities for Windows 95/98 (all versions),
pcAnywhere32 7.5 and higher for WinNT.
Homepage
Download
Use this version of the pattern file for all Trend Micro products running on Intel or DEC Alpha based operating systems and for products using Trend’s virus scanning API Library. Because more than 200 new viruses are discovered every month, it is strongly suggested that you update your virus pattern files regularly.
Homepage
Download
Homepage
Download
This is the latest virus pattern to detect the latest viruses. This update will work on the following products: NAV 2000 for Win9x/NT/2000,
NAV 2001 for Win95b/98/NT/2000/Me,
NAV 2002 Professional Edition,
NAV 2002 for Win98/Me/NT/2000/XP Home/XP Pro,
NAV 4.0 for Windows 3.51,
NAV 5.0 and 2000 for Win9x,
NAV 5.0 and 2000 for WinNT,
NAV for Firewalls 1.5 or higher,
NAV for Lotus Notes (Intel),
NAV for MS Exchange (Intel),
Norton SystemWorks (all versions),
Norton Utilities for Windows 95/98 (all versions),
pcAnywhere32 7.5 and higher for WinNT.
Homepage
Download
NAV 2001 for Win95b/98/NT/2000/Me,
NAV 2002 Professional Edition,
NAV 2002 for Win98/Me/NT/2000/XP Home/XP Pro,
NAV 4.0 for Windows 3.51,
NAV 5.0 and 2000 for Win9x,
NAV 5.0 and 2000 for WinNT,
NAV for Firewalls 1.5 or higher,
NAV for Lotus Notes (Intel),
NAV for MS Exchange (Intel),
Norton SystemWorks (all versions),
Norton Utilities for Windows 95/98 (all versions),
pcAnywhere32 7.5 and higher for WinNT.
Homepage
Download
Use this version of the pattern file for all Trend Micro products running on Intel or DEC Alpha based operating systems and for products using Trend’s virus scanning API Library. Because more than 200 new viruses are discovered every month, it is strongly suggested that you update your virus pattern files regularly.
Homepage
Download
Homepage
Download
The Cleaner 3.5 build 3501 is now available.