Hi, is it possible to have a clamav signature for the exploit ? Proof of conecpt here: http://www.computerterrorism.com/research/ie/poc.htm
Regards. -- Cedric Foll Ingénieur Sécurité & Réseaux Division Informatique, Rectorat de Rouen "More people are killed every year by pigs than by sharks, which shows you how good we are at evaluating risk." Bruce Schneier _______________________________________________ http://lurker.clamav.net/list/clamav-users.html