Notas de la edición de Sophos Endpoint Security and Control

Fase de mantenimiento

Endpoint Security and Control versión 9.5 se encuentra en fase de mantenimiento. Aunque todavía se mantiene el soporte y las actualizaciones mensuales de datos de amenazas y motor de detección, el desarrollo de funciones ha cesado. Para ver la fecha de retirada visite http://www.sophos.com/es-es/support/retirements.aspx.

Puede actualizarse a la versión 10.

Versión

Sophos Anti-Virus 9.5.7
Sophos Client Firewall 2.5.0
Sophos AutoUpdate 2.5.13

Para identificar la versión de datos de amenazas y motor de detección:

  1. Abra Endpoint Security and Control.
  2. En el panel de la izquierda, en la sección Ayuda e información, haga clic en Ver información del producto.
  3. En la sección Antivirus y HIPS, haga clic en Software.
Nota: Algunas de las funciones mencionadas en este documento sólo están disponibles en los equipos administrados o si dispone de la licencia correspondiente.

Novedades en esta versión

  • Se han actualizado el motor de detección de amenazas y los datos de amenazas.

Problemas corregidos

  • (DEF85900) Los ejecutables de Sophos no empleaban el marcador /DYNAMICBASE en la selección aleatoria del diseño del espacio de direcciones (ASLR), en particular los que se cargaban en procesos que no eran de Sophos.
  • (DEF85524) Vulnerabilidad de scripts de sitios (XSS) al utilizar el objeto auxiliar de explorador (BHO) cuando se bloquea un sitio web.

Problemas conocidos

A continuación se muestran los problemas conocidos en esta edición. Para ver la lista actualizada con nuevos problemas detectados posteriormente, consulte el artículo http://www.sophos.com/es-es/support/knowledgebase/110579.aspx.

Programa de instalación independiente

  • (CR26760) Se produce un error inesperado en la instalación de Sophos Client Firewall al ejecutarse desde un archivo de instalación (.msi) en Windows Vista con el Control de acceso de usuario activado.

Sophos Anti-Virus

  • La protección web utiliza LSP (Layered Service Provider) para facilitar la comprobación de direcciones. Al activar la protección web con un LSP no compatible, el sistema se puede volver inestable. Si se detecta un LSP no compatible en el sistema, no se instala Sophos LSP. Para más información, consulte http://www.sophos.com/es-es/support/knowledgebase/111203.aspx.

  • (DEF59971) Los mensajes en el registro de la protección web pueden incluir referencias no demasiado claras, por ejemplo: "Acceso bloqueado a "www.ejemplo.com" para el usuario PC123\Tim. 'Mal/HTMLGen-A' detectado en este sitio web, referencia 19." Aún no se dispone de clave para estas referencias.
  • (DEF57112) El escaneado en acceso se encuentra desactivado al revertir la actualización de Sophos Endpoint Security and Control 9.5 en los siguientes casos:
    • Disponía de Sophos Anti-Virus 6 o anterior.
    • Se ha actualizado a SESC 9.5.
    • Intenta revertir a SESC 9.X o posterior.

    Se mostrará un mensaje de error y el sistema dejará de está protegido. Para solucionar este problema debe borrar las siguientes claves del registro y reiniciar el servicio de SAV.

    HKEY_LOCAL_MACHINE\SOFTWARE\Sophos\SAVI

    HKEY_LOCAL_MACHINE\SOFTWARE\Sophos\SAVI\SAV-0000 a SAV-NNNN

    (donde NNNN es la última clave).

  • (DEF56055) Si modifica de forma manual la lista DNS desde el Panel de control, la protección activa de Sophos dejará de funcionar. Para solucionar este problema, reinicie el servicio de Sophos Anti-Virus.
  • (WKI55631) La protección web no es compatible con Windows XP Service Pack 1 ni Windows 2000 Service Pack 3. Para solucionar este problema, instale las actualizaciones más recientes del sistema operativo.
  • (DEF20694) Cuando Sophos Anti-Virus detecta una aplicación restringida en una unidad compartida remota, la alerta se referirá erróneamente al equipo local.
  • (DEF18144, DEF 16510) Existen ciertos problemas conocidos en el escaneado del contenido web con las extensiones de algunos navegadores, como Google Gears y RealPlayer versión 11 (descarga y grabación). Desactive las extensiones de estos navegadores.

Sophos Device Control

  • (DEF39454) En Windows Vista, cuando un usuario que no es administrador inserta un dispositivo bloqueado por Sophos Device Control, se le pide que introduzca credenciales de administrador. El usuario no podrá acceder al dispositivo, con o sin introducir las credenciales. Sin embargo, si no introduce credenciales de administrador, no se enviará ninguna alerta a la consola de administración.

Sophos Client Firewall

  • (DEF61237) Al actualizar Sophos Endpoint Security and Control a la versión 9.5, Sophos Client Firewall puede mostrar un mensaje de solicitud de acceso a la red para el proceso oculto SAVProxy.exe iniciado por %ProgramFiles%\Sophos\AutoUpdate\ALMon.exe. Para solucionar este problema, permita el acceso a la red a todos los procesos ocultos iniciados por ALMon.exe y reinicie el sistema.
  • (DEF59219) Si intenta añadir una suma de verificación para ciertas aplicaciones del sistema en la carpeta System32 desde el cuadro de diálogo Configuración del cortafuegos, la suma de verificación que se añade es la de la aplicación equivalente en la carpeta SysWOW64. El modo interactivo sí permite añadir la suma de verificación de cada aplicación.
  • (WKI55953) Al instalar Sophos Client Firewall, se desconectan de forma temporal todos los dispositivos de red. Esto puede provocar una pérdida de acceso a la red de hasta 20 segundos en aplicaciones como Microsoft Remote Desktop.
  • (WKI32813) Sophos Client Firewall detecta Internet Explorer 8 como un proceso oculto. Para más información, consulte http://www.sophos.com/es-es/support/knowledgebase/54899.aspx.
  • (DEF18752) En Windows XP con Sophos Client Firewall y VMware, los equipos virtuales pueden no tener acceso a la red. Para más información, consulte http://www.sophos.com/es-es/support/knowledgebase/15434.aspx.
  • (DEF53171) Sophos Client Firewall no es compatible con el módulo de “banda ancha móvil” en Windows 7.
  • (DEF16039) Sophos Client Firewall bloquea ocasionalmente aplicaciones de confianza.
  • (CR27434) Al cambiar las reglas en el editor de configuración, se bloquean de forma momentánea paquetes de tráfico que no debería verse afectado por la actualización de dichas reglas. Aunque el incidente sólo dura unos instantes, es posible que se perciba si se envían alertas en la consola.
  • (CR27073) Las direcciones e interfaces de IPv6 del registro del tráfico no se registran en formato IPv6.
  • (CR26950) No es posible desplazarse utilizando la tecla del tabulador después de añadir y eliminar una aplicación en la parte superior de la ficha Procesos.
  • (CR26248) Cuando el registro se visualiza en una vista que se actualiza de forma automática (como Conexiones autorizadas), la vista deja de actualizarse en estados de sobrecarga del servicio. Al pasar a otra vista y volver a la anterior, la actualización automática funciona correctamente.
  • (CR25569) Aunque las reglas que bloquean el tráfico IPv6 bloquean el tráfico que se aproxima o sale del equipo, no bloquean el tráfico loopback IPv6.

Información adicional

  • En Windows 2000 con Internet Explorer 5 ó 6, la protección web permite el acceso a direcciones bloqueadas a través de Windows Explorer.
  • El sistema de control de dispositivos de Sophos no bloquea los dispositivos de almacenamiento extraíbles que se utilizan como unidades del sistema, ya que esto suele desestabilizar el sistema operativo.
  • La instalación independiente de Endpoint Security and Control no es compatible con Windows Server Core.
  • La instalación independiente y administrada de Endpoint Security and Control no son compatibles con Windows Server Core Hyper-V.
  • Componentes compartidos de Windows

    Al instalar el software de Sophos, también se instalan o actualizan ciertos componentes de Windows:

    Software de Sophos Componentes compartidos de Windows
    Nombre Archivo Versión Fecha de inclusión en el software de Sophos
    Sophos Anti-Virus Microsoft XML Core Services msxml4.dll 4.30.2100.0 Septiembre de 2009
    msxml4r.dll 4.30.2100.0 Septiembre de 2009
    ATL Library ATL80.dll 8.0.50727.4053 Junio de 2007
    Microsoft Visual C/C++ Runtime Libraries msvcm80.dll 8.0.50727.4053 Junio de 2007
    msvcp80.dll 8.0.50727.4053 Junio de 2007
    msvcr80.dll 8.0.50727.4053 Junio de 2007
    Sophos AutoUpdate Windows Installer msi.dll 2.0.2600.2 Noviembre de 2003
    msiexec.exe 2.0.2600.2 Noviembre de 2003
    msihnd.dll 2.0.2600.2 Noviembre de 2003
    msimain.sdb n/d Noviembre de 2003
    msimsg.dll 2.0.2600.2 Noviembre de 2003
    msisip.dll 2.0.2600.2 Noviembre de 2003
    msls31.dll 3.10.337.0 Noviembre de 2003
    mspatcha.dll 5.1.2600.0 Noviembre de 2003
    riched20.dll 5.30.23.1200 Noviembre de 2003
    sdbapiU.dll 1.0.0.1 Noviembre de 2003
    shfolder.dll 5.0.2919.20 Noviembre de 2003
    usp10.dll 1.325.2180.1 Noviembre de 2003
    Sophos Client Firewall Microsoft XML Core Services msxml4.dll 4.30.2100.0 Septiembre de 2009
    msxml4r.dll 4.30.2100.0 Septiembre de 2009
    Microsoft Visual C/C++ Runtime Libraries msvcm80.dll 8.0.50727.4053 Marzo de 2010
    msvcp80.dll 8.0.50727.4053 Marzo de 2010
    msvcr80.dll 8.0.50727.4053 Marzo de 2010

Soporte técnico

Para obtener asistencia técnica sobre cualquier producto de Sophos, puede:

Aviso legal

Copyright © 2009-2013 Sophos Limited. Todos los derechos reservados. Ninguna parte de esta publicación puede ser reproducida, almacenada o transmitida de ninguna forma, ni por ningún medio, sea éste electrónico, químico, mecánico, electro-óptico, grabación, fotocopia o cualquier otro, a menos que disponga de una licencia válida, en cuyo caso puede reproducirse según los términos del acuerdo de licencia, o con la previa autorización escrita por parte del propietario.

Sophos y Sophos Anti-Virus son marcas registradas de Sophos Limited. Otros productos o empresas mencionados son marcas comerciales o registradas de sus respectivos propietarios.

Common Public License

El software de Sophos descrito en este documento incluye o puede incluir software bajo licencia (o sublicencia) Common Public License (CPL), que, entre otros derechos, permiten al usuario tener acceso al código fuente. Las licencias de dichos programas, que se distribuyen al usuario en formato de código de objeto, exigen que el código fuente esté disponible para el usuario. Para cualquiera de tales programas, el código fuente está disponible mediante solicitudes por correo ordinario; por email a support@sophos.com o desde la página web http://www.sophos.com/es-es/support/contact-support/contact-information.aspx. Puede encontrar una copia de los términos de licencia en http://opensource.org/licenses/cpl1.0.php

ConvertUTF

Copyright 2001–2004 Unicode, Inc.

This source code is provided as is by Unicode, Inc. No claims are made as to fitness for any particular purpose. No warranties of any kind are expressed or implied. The recipient agrees to determine applicability of information provided. If this file has been purchased on magnetic or optical media from Unicode, Inc., the sole remedy for any claim will be exchange of defective media within 90 days of receipt.

Unicode, Inc. hereby grants the right to freely use the information supplied in this file in the creation of products supporting the Unicode Standard, and to make copies of this file in any form for internal or external distribution as long as this notice remains attached.

dtoa.c

The author of this software is David M. Gay.

Copyright © 1991, 2000 by Lucent Technologies.

Permission to use, copy, modify, and distribute this software for any purpose without fee is hereby granted, provided that this entire notice is included in all copies of any software which is or includes a copy or modification of this software and in all copies of the supporting documentation for such software.

THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR IMPLIED WARRANTY. IN PARTICULAR, NEITHER THE AUTHOR NOR LUCENT MAKES ANY REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR PURPOSE.

Info-ZIP

Copyright © 1990–2005 Info-ZIP. Todos los derechos reservados.

For the purposes of this copyright and license, “Info-ZIP” is defined as the following set of individuals:

Mark Adler, John Bush, Karl Davis, Harald Denker, Jean-Michel Dubois, Jean-loup Gailly, Hunter Goatley, Ed Gordon, Ian Gorman, Chris Herborth, Dirk Haase, Greg Hartwig, Robert Heath, Jonathan Hudson, Paul Kienitz, David Kirschbaum, Johnny Lee, Onno van der Linden, Igor Mandrichenko, Steve P. Miller, Sergio Monesi, Keith Owens, George Petrov, Greg Roelofs, Kai Uwe Rommel, Steve Salisbury, Dave Smith, Steven M. Schweda, Christian Spieler, Cosmin Truta, Antoine Verheijen, Paul von Behren, Rich Wales, Mike White

This software is provided “as is,” without warranty of any kind, express or implied. In no event shall Info-ZIP or its contributors be held liable for any direct, indirect, incidental, special or consequential damages arising out of the use of or inability to use this software.

Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:

  1. Redistributions of source code must retain the above copyright notice, definition, disclaimer, and this list of conditions.
  2. Redistributions in binary form (compiled executables) must reproduce the above copyright notice, definition, disclaimer, and this list of conditions in documentation and/or other materials provided with the distribution. The sole exception to this condition is redistribution of a standard UnZipSFX binary (including SFXWiz) as part of a self-extracting archive; that is permitted without inclusion of this license, as long as the normal SFX banner has not been removed from the binary or disabled.
  3. Altered versions—including, but not limited to, ports to new operating systems, existing ports with new graphical interfaces, and dynamic, shared, or static library versions—must be plainly marked as such and must not be misrepresented as being the original source. Such altered versions also must not be misrepresented as being Info-ZIP releases—including, but not limited to, labeling of the altered versions with the names “Info- ZIP” (or any variation thereof, including, but not limited to, different capitalizations), “Pocket UnZip,” “WiZ” or “MacZip” without the explicit permission of Info-ZIP. Such altered versions are further prohibited from misrepresentative use of the Zip-Bugs or Info-ZIP e-mail addresses or of the Info-ZIP URL(s).
  4. Info-ZIP retains the right to use the names “Info-ZIP,” “Zip,” “UnZip,” “UnZipSFX,” “WiZ,” “Pocket UnZip,” “Pocket Zip,” and “MacZip” for its own source and binary releases.

mt19937ar.c

Copyright (c) 1997–2002 Makoto Matsumoto and Takuji Nishimura. Todos los derechos reservados.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

  1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
  2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
  3. The names of its contributors may not be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

OpenSSL cryptographic toolkit

The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org.

OpenSSL license

Copyright © 1998-2011 The OpenSSL Project. Todos los derechos reservados.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

  1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
  2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
  3. All advertising materials mentioning features or use of this software must display the following acknowledgment:

    “This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)”

  4. The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.
  5. Products derived from this software may not be called “OpenSSL” nor may “OpenSSL” appear in their names without prior written permission of the OpenSSL Project.
  6. Redistributions of any form whatsoever must retain the following acknowledgment:

    “This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)”

THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT “AS IS” AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).

Original SSLeay license

Copyright © 1995–1998 Eric Young (eay@cryptsoft.com) All rights reserved.

This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscape’s SSL.

This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).

Copyright remains Eric Young’s, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

  1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
  2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
  3. All advertising materials mentioning features or use of this software must display the following acknowledgement:

    “This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)”

    The word “cryptographic” can be left out if the routines from the library being used are not cryptographic related :-).

  4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement:

    “This product includes software written by Tim Hudson (tjh@cryptsoft.com)”

THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

The license and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution license [including the GNU Public License.]

Simple ECMAScript Engine

Copyright © 2003, 2004, 2005, 2006, 2007 David Leonard. Todos los derechos reservados.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

  1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
  2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
  3. Neither the name of David Leonard nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

strcasestr.c

Copyright © 1990, 1993 The Regents of the University of California. Todos los derechos reservados.

This code is derived from software contributed to Berkeley by Chris Torek.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

  1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
  2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
  3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

UnRAR

The source code of UnRAR utility is freeware. This means:

  1. All copyrights to RAR and the utility UnRAR are exclusively owned by the author - Alexander Roshal.
  2. The UnRAR sources may be used in any software to handle RAR archives without limitations free of charge, but cannot be used to re-create the RAR compression algorithm, which is proprietary. Distribution of modified UnRAR sources in separate form or as a part of other software is permitted, provided that it is clearly stated in the documentation and source comments that the code may not be used to develop a RAR (WinRAR) compatible archiver.
  3. The UnRAR utility may be freely distributed. It is allowed to distribute UnRAR inside of other software packages.
  4. THE RAR ARCHIVER AND THE UnRAR UTILITY ARE DISTRIBUTED “AS IS”. NO WARRANTY OF ANY KIND IS EXPRESSED OR IMPLIED. YOU USE AT YOUR OWN RISK. THE AUTHOR WILL NOT BE LIABLE FOR DATA LOSS, DAMAGES, LOSS OF PROFITS OR ANY OTHER KIND OF LOSS WHILE USING OR MISUSING THIS SOFTWARE.
  5. Installing and using the UnRAR utility signifies acceptance of these terms and conditions of the license.
  6. If you don’t agree with terms of the license you must remove UnRAR files from your storage devices and cease to use the utility.

Thank you for your interest in RAR and UnRAR.

Alexander L. Roshal