lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20061214041552.26628.qmail@securityfocus.com> Date: 14 Dec 2006 04:15:52 -0000 From: schafer_jeffrey@...mail.com To: bugtraq@...urityfocus.com Subject: Re: Microsoft 0-day word vulnerability - Secunia - Extremely critical I'm seeing this vulnerability detected like crazy as of 12 Dec. Symantec is picking it up as Bloodhound.Exploit.106 as of 12 DEC defs. Strange thing is that some of the docs I'm seeing being detected with this vulnerability are docs users have had on their systems for years and haven't opened in a very long time...so how are they getting infected???