What are people on this list doing about the recently-announced
vulnerability in Acrobat Reader?
Some recent coverage:
http://vrt-sourcefire.blogspot.com/2009/02/have-nice-weekend-pdf-love.html
http://it.slashdot.org/article.pl?sid=09/02/24/0032201
Recommending that people disable JavaScript in Adobe I believe is the only
current course of action other than blocking PDFs which will likely cause
people wth pitchforks and torches to storm the IT Castle.
Other than that, unfortunately I'm hoping March 11th when Adobe is supposed
to patch
Kevin wrote on 02/24/2009 02:16:38 PM:
Recommending that people disable JavaScript in Adobe I believe is the
only
current course of action other than blocking PDFs which will likely cause
people wth pitchforks and torches to storm the IT Castle.
Blocking PDF's is not going to be popular.
Blocking PDF's is not going to be popular. Can/will the AV definitions be
able to detect malicious files?
I don't know. I don't think many people have much information about the
exploit.
Other than that, unfortunately I'm hoping March 11th when Adobe is
supposed
to patch comes quickly
Kenneth Porter wrote:
What are people on this list doing about the recently-announced
vulnerability in Acrobat Reader?
Some recent coverage:
http://vrt-sourcefire.blogspot.com/2009/02/have-nice-weekend-pdf-love.html
http://it.slashdot.org/article.pl?sid=09/02/24/0032201
Turning off
wbr...@e1b.org wrote:
Blocking PDF's is not going to be popular. Can/will the AV definitions be
able to detect malicious files?
According to
http://vrt-sourcefire.blogspot.com/2009/02/have-nice-weekend-pdf-love.html,
ClamAV has signatures.
The clam sigs are called Exploit.PDF-26,
Looks like ClamAvV has added definitions for some PDF vulnerabilities
today:
http://lurker.clamav.net/message/20090224.162205.44ab94c8.en.html
--
May you solve interesting problems
William Brown
Web Development Messaging Services
Technology Services, WNYRIC, Erie 1 BOCES
(716)821-7285
David F. Skoll wrote:
I think I'll stick to xpdf for now.
Yay xpdf!!
-ben
--
Ben Kamen - O.D.T., S.P.
=
Email: bkamen AT benjammin DOT net Web: http://www.benjammin.net
As seen somewhere on the net:
On Tue, Feb 24, 2009 at 20:09, wbr...@e1b.org wrote:
Looks like ClamAvV has added definitions for some PDF vulnerabilities
today:
Snort have released signatures, though I don't know whether they are
for the exploits or the vulnerability.
--
Please keep list traffic on the
--On Tuesday, February 24, 2009 2:42 PM -0500 Kevin A. McGrail
kmcgr...@pccc.com wrote:
I don't know. I don't think many people have much information about the
exploit.
The blog link I posted earlier indicates that it's the jbig2 decompression
code that fails with a crafted jbig2 object,
10 matches
Mail list logo