Hello Everyone !
Here we are happy to announce that the COMODO Internet Security/Antivirus/Firewall 8.2.0.4978 fixes build is released ! Main focus of the release is to address a few security vulnerabilities that were recently reported by the Google Project Zero team.
If you believe you found a vulnerability in any of our products or partner products distributed with our products, please contact with us at security[at]comodo.com
PS: We’re very close to release our new major version of CIS which will include a number of new features and a brand new design, we will be updating you on this case accordingly !!
Existing CIS 6.x, CIS 7x and CIS 8.x users will receive an automatic update offer for CIS 8.2.0.4978 fixes release.
What’s new in 8.2.0.4978 ?
Improved:
- New Home Page and Quick Search mechanism
- New file group “Media Players” in Auto-Sandbox rules
Fixed:
• Network is not available after update from Windows 7 to Windows 10 with CIS/CAV/CFW installed
• Windows Firewall is not enabled after CIS uninstallation if PC is upgraded from Windows 7 to Windows 10
• Website Filtering does not block web sites in Google Chrome 49
We would like to thank Tavis Ormandy of Google, for reporting the following issues and working with us to protect our users:
• Antivirus engine libraries does not have ASLR enabled
• PackMan unpacker insufficient parameter validation
• LZMA Decoder Performs Insufficient Parameter Checks, Resulting in Heap Overflow
• Integer Overflow Leading to Heap Overflow Parsing Composite Documents
• Integer Overflow leading to Heap Overflow in MSVB API
• Emulator can be bypassed to leak data and/or modify certain system settings by initiating a scan on a specially crafted PE file
• Heap Overflow in LZX Decompression
• Buffer Overflow handling PSUBUSB (Packed Subtract Unsigned with Saturation)
• ACLs on Comodo’s folder in %ProgramData% allow unauthorized users write access
We would like to thank Greg Linares of Cyberpoint SRT, for reporting the following issue and working with us to protect our users:
• Chromodo_setup.exe can be injected DLLs from users’ folder if cmdshim32.dll is missing from the installation of CIS/CAV/CFW
We would like to thank Stefan Kanthak, for reporting the following issue and working with us to protect our users:
• DLL load ordering error allows CIS/CAV/CFW installers to load implanted DLLs from installer and application data folders
Download Location
Comodo Internet Security
http://download.comodo.com/cis/download/installs/4055/standalone/cispremium_installer.exe
Size: 218M ( 228588464 )
MD5: e3bfa036babdf134c7b7966b6d4d5eda
SHA1: 055bfc26501e70dbda7f122000999d9e4911eede
Comodo Antivirus
http://download.comodo.com/cis/download/installs/4055/standalone/cav_installer.exe
Size: 218M ( 228588464 )
MD5: 8db877203a9522e601533a1ed48d6a3c
SHA1: 5539cf309780f47b9cbd45448eec4ecc4146a24f
Comodo Firewall
http://download.comodo.com/cis/download/installs/4055/standalone/cmd_fw_installer.exe
Size: 218M ( 228588464 )
MD5: 37b5b221402a14cd72dbac876f10cbf7
SHA1: c65ebbae96db2b69f1f61a6545e06885ab605042