Rick Macdougall wrote:
> Elizabeth Schwartz wrote:
>> On 11/23/05, Cedric Foll <[EMAIL PROTECTED]> wrote:
>>> is it possible to have a clamav signature for the exploit ?
>>> Proof of conecpt here:
>>> http://www.computerterrorism.com/research/ie/poc.htm
>>
>>
>> I dunno about anyone else here , b
Elizabeth Schwartz wrote:
> On 11/23/05, Cedric Foll <[EMAIL PROTECTED]> wrote:
>>
>> is it possible to have a clamav signature for the exploit ? Proof of
>> conecpt here: http://www.computerterrorism.com/research/ie/poc.htm
>
>
> I dunno about anyone else here , but I haven't heard of this site
Elizabeth Schwartz wrote:
On 11/23/05, Cedric Foll <[EMAIL PROTECTED]> wrote:
is it possible to have a clamav signature for the exploit ?
Proof of conecpt here:
http://www.computerterrorism.com/research/ie/poc.htm
I dunno about anyone else here , but I haven't heard of this site and I
really,
On 11/23/05, Cedric Foll <[EMAIL PROTECTED]> wrote:
>
> is it possible to have a clamav signature for the exploit ?
> Proof of conecpt here:
> http://www.computerterrorism.com/research/ie/poc.htm
I dunno about anyone else here , but I haven't heard of this site and I
really, REALLY don't want to
Hi,
is it possible to have a clamav signature for the exploit ?
Proof of conecpt here: http://www.computerterrorism.com/research/ie/poc.htm
Regards.
--
Cedric Foll
Ingénieur Sécurité & Réseaux
Division Informatique, Rectorat de Rouen
"More people are killed every year by pigs than by sharks,