is it not 18:00 ? (EST is GMT -5 ?) Not too sure about this
Oops yes. Sorry my maths is off. I subtracted 5 hours instead of adding them.
*quietly hides his time machine*
For reference, Symantec, Avast! and Sophos all detect the malicious code and succesfully block attempts on it running.
IE7 Zero Day Technical Analysis - Security Labs Blog - Type the XML / SPAN lines into a webpage, whack it on your local webserver, visit it from one of your machines then check the AV logs and see if it's caught and killed the page - they should all pick it up via heuristic detection.
Yes, the hole is there in IE, but yes, most decent AV systems are already catching and halting it.
I have been thankful that we broke up last Friday and I've only had the office staff to contend with. I disabled the internet for others just in case they came in (unlikely) and put the fear of [insert deity of choice] up the office staff. Fortunately, they're very well-behaved normally. We seem to have mutual respect based on unreasonable requests... I listen to their rants behind a closed door and they listen to mine Hopefully, all will be well. I'll be in first thing tomorrow to apply the patch!
Until then, fingers remain crossed
Will the patch be available as an admin installion patch ie something to download and for me to run round school tomorrow and install it manually on staff laptops?
Whats everyone done so far?
The patch is spurting forth from my WSUS server right now. Not sure when it was issued, but sync your server and it should appear.
Separate patches for IE6 and IE7. Not sure if they've released a patch for IE5.
Oh, and why is this week that my WSUS server decides to die...
Ah well, a quick download and added the patch to the startup scripts... I wonder what it did to the machines running IE6...
There are currently 1 users browsing this thread. (0 members and 1 guests)