-----BEGIN PGP SIGNED MESSAGE-----
____/ Doug Mentohl on Saturday 21 February 2009 14:41 : \____
> Ezekiel wrote:
>> Exactly what part of the statement that this vulnerability exists in *all*
>> versions including those for LINUX and OSX is too difficult for you to
> "When successful, the following files are dropped and installed:
> %UserProfile%\Local Settings\Temp\svchost.exe (Backdoor-DTJ trojan) "
> Where's the Mac OS X and Linux working version. How do I get svchost.exe
> to execute the same zero-day behavour on a Mac or Linux OS. Provide a
> link to a working exploit.
The Munchkins can go about Wine and whine.
~~ Best of wishes
Roy S. Schestowitz | Linux: stop maintenance; get more actual work done
http://Schestowitz.com | RHAT Linux | PGP-Key: 0x74572E8E
17:05:01 up 14 days, 12:23, 2 users, load average: 1.79, 1.40, 1.17
http://iuron.com - Open Source knowledge engine project
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
-----END PGP SIGNATURE-----