Comodo Internet Security 8.2.0.4978 fixes build is released!!!!

Hello Everyone ! :slight_smile:

Here we are happy to announce that the COMODO Internet Security/Antivirus/Firewall 8.2.0.4978 fixes build is released ! Main focus of the release is to address a few security vulnerabilities that were recently reported by the Google Project Zero team.

If you believe you found a vulnerability in any of our products or partner products distributed with our products, please contact with us at security[at]comodo.com

PS: We’re very close to release our new major version of CIS which will include a number of new features and a brand new design, we will be updating you on this case accordingly !!

Existing CIS 6.x, CIS 7x and CIS 8.x users will receive an automatic update offer for CIS 8.2.0.4978 fixes release.

What’s new in 8.2.0.4978 ?

Improved:

  • New Home Page and Quick Search mechanism
  • New file group “Media Players” in Auto-Sandbox rules

Fixed:

• Network is not available after update from Windows 7 to Windows 10 with CIS/CAV/CFW installed
• Windows Firewall is not enabled after CIS uninstallation if PC is upgraded from Windows 7 to Windows 10
• Website Filtering does not block web sites in Google Chrome 49

We would like to thank Tavis Ormandy of Google, for reporting the following issues and working with us to protect our users:

• Antivirus engine libraries does not have ASLR enabled
• PackMan unpacker insufficient parameter validation
• LZMA Decoder Performs Insufficient Parameter Checks, Resulting in Heap Overflow
• Integer Overflow Leading to Heap Overflow Parsing Composite Documents
• Integer Overflow leading to Heap Overflow in MSVB API
• Emulator can be bypassed to leak data and/or modify certain system settings by initiating a scan on a specially crafted PE file
• Heap Overflow in LZX Decompression
• Buffer Overflow handling PSUBUSB (Packed Subtract Unsigned with Saturation)
• ACLs on Comodo’s folder in %ProgramData% allow unauthorized users write access

We would like to thank Greg Linares of Cyberpoint SRT, for reporting the following issue and working with us to protect our users:

• Chromodo_setup.exe can be injected DLLs from users’ folder if cmdshim32.dll is missing from the installation of CIS/CAV/CFW

We would like to thank Stefan Kanthak, for reporting the following issue and working with us to protect our users:

• DLL load ordering error allows CIS/CAV/CFW installers to load implanted DLLs from installer and application data folders

Download Location

Comodo Internet Security
http://download.comodo.com/cis/download/installs/4055/standalone/cispremium_installer.exe

Size: 218M ( 228588464 )
MD5: e3bfa036babdf134c7b7966b6d4d5eda
SHA1: 055bfc26501e70dbda7f122000999d9e4911eede

Comodo Antivirus
http://download.comodo.com/cis/download/installs/4055/standalone/cav_installer.exe

Size: 218M ( 228588464 )
MD5: 8db877203a9522e601533a1ed48d6a3c
SHA1: 5539cf309780f47b9cbd45448eec4ecc4146a24f

Comodo Firewall
http://download.comodo.com/cis/download/installs/4055/standalone/cmd_fw_installer.exe

Size: 218M ( 228588464 )
MD5: 37b5b221402a14cd72dbac876f10cbf7
SHA1: c65ebbae96db2b69f1f61a6545e06885ab605042

TeĹźekkĂĽrler. :slight_smile: (Thanks)

Thank you, great :-TU

Congratulations with and thank you for the new release. :-TU

Running the program updater but it runs an error at 10.3% when downloading the updates. Edit: it is fixed now and it downloaded successfully.

Thanks to the bug reporters, and thanks for fixes to Comodo devs :-TU It is sad to know tha we were vulnerable with these… but thanks god, now all covered :wink: Keep up working on CIS v9 8)

Thanks :-TU

Today is a great day, isnt it? :stuck_out_tongue:

Great to see these kind of bugs getting adressed… Keep them coming COMODO and keep devs around the globe as near as possible. Alltogheter for better security, for safe web surfing, for greatness!!! COMODO for life!!!

/Merchandising off :3

https://twitter.com/taviso/status/712384200842711040

Cant read it. Please post print?

“Comodo antivirus forwards emulated Win32 API calls to the real API during scans.”

What does it mean? Is it a good thing?

https://bugs.chromium.org/p/project-zero/issues/detail?id=769

Beautiful!!! Thanks for the tracker. So COMODO did solve the issues reported by him. Nice to see it. lets hope this behavior keep perpetuating for now on, by talking to other devs and working with them to solve things.

We have addressed all those bugs in this update guys. As you can read in the history in the bug report link, we worked with Tavis to make sure we understand the issues carefully.

Thanks Comodo. :-TU

I saw it. this is great egemen!!!

Do you know if some of these updates applies to ccav too?

Wondering what the “•New Home Page and Quick Search mechanism” means. Is that about those who choose to let it set their browser home page or actually about the “home page” of the product interface?

great work everyone!

What have you called “fixed”?
Even guests are still able to modify important Comodo’s files!
The simplest path to break CIS (even protected by password!) is the command:

%COMSPEC% /c for /R "%PROGRAMDATA%\Comodo" %p in (*) do copy %COMSPEC% "%p" /y

And what are you going to do with the weak hash?

No they do not apply to CCAV. CCAV uses different modules.