Nothing Special   »   [go: up one dir, main page]

[prev in list] [next in list] [prev in thread] [next in thread] 

List:       patchmanagement
Subject:    Re: WMF exploits pages in the wild... take mitigation measures [as no patch]
From:       InfoSecBOFH <infosecbofh () gmail ! com>
Date:       2005-12-31 20:09:51
Message-ID: 2be58a30512311209j54f0c186pd9460a6752ba767e () mail ! gmail ! com
[Download RAW message or body]

Not to bash vendors here.  But I noticed both the post from PivX and
the person reccomending Snort signatures.  If any of you monitor other
mailing lists you will note that the majority of signature based
systems are not properly detecting this vulnerability and are dishing
out false positives.  I am not saying that these two products
specifically suck, but I am saying that one should not have a false
sense of security.

Just a warning to those considering antique signature based systems. 
There are far better ways to mitigate this and all issues.

---
Looking for RSS? The Patchmanagement.org list is available via
http://listserver.patchmanagement.org/read/rss?forum=patchmanagement

PatchManagement.org is hosted by Shavlik Technologies

To unsubscribe send a blank email to leave-patchmanagement@patchmanagement.org
If the above unsubscribe doesn't work, view your email headers
(in Outlook, open message, View-Options) and send a blank email to the address
listed in the header that starts with 'List-Unsubscribe'.
If you are unable to unsubscribe via the above email address, please email
owner-patchmanagement@patchmanagement.org

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic