<<<>>> Trend Micro, Inc. April 16, 2014 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Trend Micro (TM) Deep Security(TM) 8.0 Deep Security Relay 8.0 Service Pack 2 Critical Patch - Build 2207 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Contents =================================================================== 1. Overview of this Critical Patch Release 1.1 Issues 1.2 Enhancements 1.3 Files Included in this Release 2. Documentation Set 3. System Requirements 4. Installation/Uninstallation 4.1 Installation 4.2 Uninstallation 5. Post-installation Configuration 6. Known Issues 7. Release History 8. Contact Information 9. About Trend Micro 10. License Agreement =================================================================== 1. Overview of this Critical Patch Release ======================================================================= 1.1 Issues ==================================================================== This critical patch resolves the following issue: Issue: Deep Security Relay 8.0 for Microsoft(TM) Windows(TM) uses a version of the Nginx web server that is affected by the CVE-2014-0160 vulnerability. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution: This critical patch updates the Nginx web server program in the Deep Security Relay 8.0 for Windows package to remove the vulnerability. 1.2 Enhancements ==================================================================== There are no enhancements for this critical patch release. 1.3 Files Included in this Release ==================================================================== Relay-Windows-8.0.0-2207.i386.msi (Windows 32-bit) Relay-Windows-8.0.0-2207.x86_64.msi (Windows 64-bit) 2. Documentation Set ======================================================================= In addition to this readme.txt, the documentation set for this product includes the following: o Installation Guide (IG) -- Provides product overview, deployment plan, installation steps and basic information intended to help you deploy Deep Security smoothly. o User's Guide (UG) -- Provides post-installation instructions on how to configure the settings to help you get Deep Security "up and running". Also includes instructions on performing other administrative tasks for the day-to-day maintenance of Deep Security. o Readme.txt files -- version enhancements, known issues, and release history. There is one readme for each installable Deep Security component: Manager, Agent, Virtual Appliance, and ESX Filter Driver. o Electronic versions of the documents are available at: http://downloadcenter.trendmicro.com/ o Online help -- Context-sensitive help screens available on the Deep Security Manager that provide guidance for performing a task. o Knowledge Base -- a searchable database of known product issues, including specific problem-solving and troubleshooting topics. http://esupport.trendmicro.com 3. System Requirements ======================================================================= Refer to the "Installation Guide" or release notes for a complete list of system requirements. 4. Installation/Uninstallation ======================================================================= 4.1 Installation ==================================================================== Refer to the "Installation Guide" in the following web site for the complete installation procedure: http://downloadcenter.trendmicro.com/ 4.2 Uninstallation ==================================================================== Refer to the "Installation Guide" in the following web site for the complete uninstallation procedure: http://downloadcenter.trendmicro.com/ 5. Post-installation Configuration ======================================================================= No post-installation steps are required. 6. Known Issues ======================================================================= There are no known issues for this critical patch release. For other known issues, please refer to the product release notes. 7. Release History ======================================================================= - Deep Security 8.0 Service Pack 2 Build 8.0.2119, January 9, 2013 - Deep Security 8.0 Service Pack 2 Patch 1 Build 8.0.2151, June 14, 2013 - Deep Security 8.0 Service Pack 2 Patch 2 Build 8.0.2202, January 24, 2014 See the following web site for more information about updates to this product: http://www.trendmicro.com/download 8. Contact Information ======================================================================= A license to the Trend Micro software usually includes the right to product updates, pattern file updates, and basic technical support for one (1) year from the date of purchase only. After the first year, Maintenance must be renewed on an annual basis at Trend Micro's then-current Maintenance fees. You can contact Trend Micro via fax, phone, and email, or visit us at: http://www.trendmicro.com Evaluation copies of Trend Micro products can be downloaded from our web site. Global Mailing Address/Telephone numbers ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ For global contact information in the Asia/Pacific region, Australia and New Zealand, Europe, Latin America, and Canada, refer to: http://www.trendmicro.com/en/about/overview.htm The Trend Micro "About Us" screen displays. Click the appropriate link in the "Contact Us" section of the screen. Note: This information is subject to change without notice. 9. About Trend Micro ======================================================================= Trend Micro Incorporated, a global leader in Internet content security and threat management, aims to create a world safe for the exchange of digital information for businesses and consumers. A pioneer in server-based antivirus with over 20 years of experience, we deliver top-ranked security that fits our customers' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the Trend Micro Smart Protection Network(TM) infrastructure, our industry-leading cloud-computing security technology and products stop threats where they emerge, on the Internet, and are supported by 1,000+ threat intelligence experts around the globe. For additional information, visit www.trendmicro.com. Copyright 2014, Trend Micro Incorporated. All rights reserved. Trend Micro, the t-ball logo, Smart Protection Network, and Deep Security are trademarks of Trend Micro Incorporated and are registered in some jurisdictions. All other marks are the trademarks or registered trademarks of their respective companies. 10. License Agreement ======================================================================= More information about your license agreement with Trend Micro and Third-party licensing agreements can be found in the release notes.