Already covered in another thread. For the record, I agree with the analysis here: http://www.sophos .com/blogs/duck/g/2010/05/11/khobe-vulnerability-earth-shaker/
"Earth Shaking" is quite a bit of hyperbole, IMO... -ASB: http://XeeSM.com/AndrewBaker On Wed, May 12, 2010 at 3:42 AM, Greg Olson <[email protected]> wrote: > Anyone read this article on this new AV exploit that researchers > discovered?: > http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ > > > http://www.matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php > > Pretty much every AV vendor failed the exploit as well. > Sigh, Let's hope this doesn't get into the wild, but with so much detailed > info on what they did someone will make this a reality. > -Greg > > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
