On 12/1/16, TCW <"."> wrote:
> On 11/30/2016 8:06 AM, WaltS48 wrote:
>>> There's a zero-day exploit in the wild that's being used to execute
>>> malicious code on the computers of people using Tor and possibly other
>>> users of the Firefox browser, officials of the anonymity service
>>> confirmed Tuesday.
>>>
>>
>>> The versions span from 41 to 50, with version 45 ESR being the version
>>> used by the latest version of the Tor browser.
>>
>> <http://arstechnica.com/security/2016/11/firefox-0day-used-against-tor-users-almost-identical-to-one-fbi-used-in-2013/>
>>
>>
>> Is a fix for SeaMonkey needed?
>
> Looks like Adrian has applied it to his 2.47 build @
> http://tinyurl.com/j2ju4s7.

Would you please not post obfuscated URLs?  Especially now, in a
thread about a 0day & probably most everybody reading the thread
running exploitable software, enticing people to click on random links
is a really bad idea.

$ curl -s --head  http://tinyurl.com/j2ju4s7 | grep Location
Location: 
https://l10n.mozilla-community.org/~akalla/unofficial/seamonkey/nightly/latest-comm-release-windows32/

Thanks,
Lee
_______________________________________________
support-seamonkey mailing list
support-seamonkey@lists.mozilla.org
https://lists.mozilla.org/listinfo/support-seamonkey

Reply via email to