看来果然是虚惊一场
Last night our researchers identified similarities between the recent <http://myspacesurfer.hee-ro.net/index.php?q=uggc%3A%2F%2Fjjj.niregynof.pbz% 2Ferfrnepu%2Foybt%2Fvaqrk.cuc%2F2008%2F05%2F27%2Fsynfu-cynlre-rkcybvg-hcqngr %2F> Adobe Flash exploits and a known (patched) vulnerability: CVE-2007-0071 <http://myspacesurfer.hee-ro.net/index.php?q=uggc%3A%2F%2Faiq. avfg.tbi%2Faiq.psz%3Fpiranzr%3DPIR-2007-0071> . At first, this appeared to close the case, but there was a report of a patched version of Flash falling victim to one of these attacks, and we’ve seen an SWF file referencing a missing file named WIN 9,0,124,0i.swf, which also suggests that the latest version of Flash is the target of that file. The exploits that we have captured from the field do not appear to exploit the latest version of Flash. We continue to hunt for missing 9,0,124 exploits and will post an update should one be discovered. In the meantime, it’s best to update to the latest player, if you haven’t yet done so. [Ph4nt0m] <http://www.ph4nt0m.org/> [Ph4nt0m Security Team] <http://blog.ph4nt0m.org/> [EMAIL PROTECTED] Email: [EMAIL PROTECTED] PingMe: <http://cn.pingme.messenger.yahoo.com/webchat/ajax_webchat.php?yid=hanqin_wu hq&sig=9ae1bbb1ae99009d8859e88e899ab2d1c2a17724> === V3ry G00d, V3ry Str0ng === === Ultim4te H4cking === === XPLOITZ ! === === #_# === #If you brave,there is nothing you cannot achieve.# --~--~---------~--~----~------------~-------~--~----~ 要向邮件组发送邮件,请发到 [email protected] 要退订此邮件,请发邮件至 [EMAIL PROTECTED] -~----------~----~----~----~------~----~------~--~---
<<inline: image001.gif>>

