Already covered in another thread.

For the record, I agree with the analysis here:  http://www.sophos
.com/blogs/duck/g/2010/05/11/khobe-vulnerability-earth-shaker/

"Earth Shaking" is quite a bit of hyperbole, IMO...

-ASB: http://XeeSM.com/AndrewBaker


On Wed, May 12, 2010 at 3:42 AM, Greg Olson <[email protected]> wrote:

> Anyone read this article on this new AV exploit that researchers
> discovered?:
> http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/
>
>
> http://www.matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php
>
> Pretty much every AV vendor failed the exploit as well.
> Sigh, Let's hope this doesn't get into the wild, but with so much detailed
> info on what they did someone will make this a reality.
> -Greg
>
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to