On 23 Sep 2006, at 09:56, Rushowr wrote:

Gentlemen,

An update on my prior post. I have not confirmed a solution is in place,
but I do know that a gent has identified the virus, and symantec has
confirmed it's new. I don't know the prefix, but it'll be named after my
coworker.....dcollins is the name it'll be under.

I'll update if we have a fix, once I have confirmation

Please _don't_ ! I'm sympathetic to your situation,
and we have all shouted for help in a crisis, but.....

This VectorGraphics+Javascript+IE+windows
exploit has _no_ relevance to this group.
The only way that it is related to a discussion of asterisk
source code development would be if either:
        a) You are emphasizing the importance of safe coding style
to protect against buffer overruns and can indicate somewhere
in the asterisk codebase where you feel we should be doing better.
        b) The vulnerability in some way impacts directly on asterisk
(say via the new http/manager stuff).

There are several new vulnerabilities discovered each day, and there are
lists for them. This isn't one.

Tim Panton

www.mexuar.com



_______________________________________________
--Bandwidth and Colocation provided by Easynews.com --

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
  http://lists.digium.com/mailman/listinfo/asterisk-users

Reply via email to