-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

A serious security problem in Macromedia's Shockwave Flash plugin for all
platforms and browsers has been published on BugTraq. Exploited, it allows
an attacker to run arbitary code on your machine.

This means that an attacker would have the same rights on your computer
that you have, i.e. data reachable from your machine could be read and
transfered or modifed or viruses and worms could be spread. All of this
works through firewalls, assuming you can see Flash animations on webpages.

This has been reported to Macromedia and CERT in July 2000 and at later
occasions. Nevertheless, the bug still exists in latest versions of Flash
plugins.

For more information, refer to the post on BugTraq
<http://www.dataguard.no/bugtraq/2001_1/0001.html>.

We strongly suggest to remove Flash and Shockwave plugins. You can do that
by moving or deleting all files, that contain "flash", "shockwave", "sw"
or similar in their filename, out of your plugins directory. The plugins
directory is a subdirectory of the Beonex Communicator installation
target directory, e.g. c:\Programs\Beonex\Plugins.

Beonex Communicator does not come with Flash plugins, but might have
imported those of Netscape Communicator 4.x or you might have installed one
yourself.

Ben Bucksch
Beonex


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: Signed by <[EMAIL PROTECTED]>

iD8DBQE6VAAkRY0V+h7BIpkRAp5fAJ4k+bDaU5gApac6YRF2gKsTytNc9QCfbq/q
O2/3K1JCv0su+cAbH+uvgVw=
=+rEO
-----END PGP SIGNATURE-----

Reply via email to