-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Fri, 20 Feb 2009, Stefan König wrote:
i want to make MD skip ALL outgoing mail that is SEND through the server
via smtp to ANY relay.
I don't know how to simply check where a mail will be relayed to. You know
where it comes from, but not
I had the following problem.
Feb 24 13:43:21 rama1 mimedefang-multiplexor[27833]: Slave 2 stderr:
Can't locate object method new via package
MIME::Parser::ParanoidFiler at /usr/bin/mimedefang.pl line 5536.
Feb 24 13:43:21 rama1 mimedefang-multiplexor[27833]: Reap: slave 2 (pid
27858) exited
Javier Kohan wrote:
Feb 24 13:43:21 rama1 mimedefang-multiplexor[27833]: Slave 2 stderr:
Can't locate object method new via package
MIME::Parser::ParanoidFiler at /usr/bin/mimedefang.pl line 5536.
Did you install MIMEDefang from source? If not... please contact
the Debian MIMEDefang
What are people on this list doing about the recently-announced
vulnerability in Acrobat Reader?
Some recent coverage:
http://vrt-sourcefire.blogspot.com/2009/02/have-nice-weekend-pdf-love.html
http://it.slashdot.org/article.pl?sid=09/02/24/0032201
Recommending that people disable JavaScript in Adobe I believe is the only
current course of action other than blocking PDFs which will likely cause
people wth pitchforks and torches to storm the IT Castle.
Other than that, unfortunately I'm hoping March 11th when Adobe is supposed
to patch
Kevin wrote on 02/24/2009 02:16:38 PM:
Recommending that people disable JavaScript in Adobe I believe is the
only
current course of action other than blocking PDFs which will likely cause
people wth pitchforks and torches to storm the IT Castle.
Blocking PDF's is not going to be popular.
Blocking PDF's is not going to be popular. Can/will the AV definitions be
able to detect malicious files?
I don't know. I don't think many people have much information about the
exploit.
Other than that, unfortunately I'm hoping March 11th when Adobe is
supposed
to patch comes quickly
Kenneth Porter wrote:
What are people on this list doing about the recently-announced
vulnerability in Acrobat Reader?
Some recent coverage:
http://vrt-sourcefire.blogspot.com/2009/02/have-nice-weekend-pdf-love.html
http://it.slashdot.org/article.pl?sid=09/02/24/0032201
Turning off
wbr...@e1b.org wrote:
Blocking PDF's is not going to be popular. Can/will the AV definitions be
able to detect malicious files?
According to
http://vrt-sourcefire.blogspot.com/2009/02/have-nice-weekend-pdf-love.html,
ClamAV has signatures.
The clam sigs are called Exploit.PDF-26,
Looks like ClamAvV has added definitions for some PDF vulnerabilities
today:
http://lurker.clamav.net/message/20090224.162205.44ab94c8.en.html
--
May you solve interesting problems
William Brown
Web Development Messaging Services
Technology Services, WNYRIC, Erie 1 BOCES
(716)821-7285
David F. Skoll wrote:
I think I'll stick to xpdf for now.
Yay xpdf!!
-ben
--
Ben Kamen - O.D.T., S.P.
=
Email: bkamen AT benjammin DOT net Web: http://www.benjammin.net
As seen somewhere on the net:
On Tue, Feb 24, 2009 at 20:09, wbr...@e1b.org wrote:
Looks like ClamAvV has added definitions for some PDF vulnerabilities
today:
Snort have released signatures, though I don't know whether they are
for the exploits or the vulnerability.
--
Please keep list traffic on the
--On Tuesday, February 24, 2009 2:42 PM -0500 Kevin A. McGrail
kmcgr...@pccc.com wrote:
I don't know. I don't think many people have much information about the
exploit.
The blog link I posted earlier indicates that it's the jbig2 decompression
code that fails with a crafted jbig2 object,
13 matches
Mail list logo