Hi,

is it possible to have a clamav signature for the exploit ?
Proof of conecpt here: http://www.computerterrorism.com/research/ie/poc.htm

Regards.


-- 
Cedric Foll
Ingénieur Sécurité & Réseaux
Division Informatique, Rectorat de Rouen

"More people are killed every year by pigs than by sharks,
which shows you how good we are at evaluating risk."
Bruce Schneier
_______________________________________________
http://lurker.clamav.net/list/clamav-users.html

Reply via email to