Blog
Quick heal blog
Authentication bypass vulnerability in the Sun Solaris telnet daemon (in.telnetd) has been discovered. The Sun Solaris telnet daemon does not properly parse the USER Environment variable before passing it to the login process. By supplying a specially crafted USER Environment variable over telnet, a remote attacker may be able to...
Quick Heal acclaimed 17th VB 100% award We are happy to announce that Quick Heal 2007 received VB100 % on Windows Vista Business Edition (32-bit). This test was the first test performed on Windows Vista for this year and we passed on first attempt. In total 15 Anti-Virus products were...
Another Microsoft Word zero-day vulnerability has been discovered the fourth in two months. The flaw can be exploited by hacker to execute arbitrary code on the compromised system. An attacker could exploit this vulernabilitiy by enciting a user to open a malicous word file which could be located on a...
We are seeing again seeding of mails containing new variant of Warezov family. The attachments names could be as below postcard.exe postcard.zip message.msg.exe file.eml.scr It downloads additional components from ertikadeswiokinganfujas.com domain, which is active. more info will be posted soon, at present we have released an outbreak update.
This week we have released Quick Heal 2007 series of products. We are releasing 2007 series in phases. In the first phase we have released following products: • Quick Heal AntiVirus Plus 2007 • Quick Heal Total Security 2007 We have also released major engine update for our existing user...
We just got reports that “postcard.exe” which is being spamed in Germany and Austria. We have just released an Outbreak Update for the same, detected as “Tibs.jy” More information on the Trojan will be available shortly on our website.
Few collection of SPAM mails Its holiday time, but it seem the Spammer are out there still working. We are seeing unusual growth in number of Spam mails on Vigra, Cialis and some phishing mails of online banks. On malware front we haven’t seen any major activities so far… We...
We just received a Microsoft Word document file, which contains a new vulnerable exploit code. The flaw is due to a memory corruption error when handling a malformed document, which could be exploited by attackers to execute arbitrary commands by tricking a user into opening malformed Word document. As of...
As we are nearing to the end of 2006, Microsoft had released the 3 critical and 4 important patch for this month. The patch released contains fixes for very critical vulnerability found in SNMP Buffer Overflow and Remote Installation Service. Which total a odd figure of 133 patch(Critical and Important)...
If you regularly have to open .PDF files and are still using older version of Adobe Acrobat Reader, please switch to Adobe Acrobat 8.0. Multiple flaws has been reported in Acrobat Reader AcroReader Active X control. This flaw can be remotely exploited through a maliciously constructed web page with special...