[Micronet] Symantec vulnerability FIXED through LiveUpdate

classic Classic list List threaded Threaded
1 message Options
Reply | Threaded
Open this post in threaded view
|

[Micronet] Symantec vulnerability FIXED through LiveUpdate

Allison Henry
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Micronetters:

FYI, there is now a content update, available through the standard
Symantec LiveUpdate process, to correct the previously announced
SYM12-017 vulnerability. More info on this update and how to make sure
you've got it is posted here:

https://security.berkeley.edu/node/360

Both managed and standalone clients should receive the content update,
provided LiveUpdate is properly configured. You can also run a manual
LiveUpdate to be sure. Thanks all,

- --
Allison Henry
System and Network Security
University of California, Berkeley
http://security.berkeley.edu
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.17 (MingW32)
Comment: Using GnuPG with undefined - http://www.enigmail.net/

iEYEARECAAYFAlC3uZMACgkQKzbis0Yjv23mkgCeJLWkw/8bN7mvKhk4gVtv9jpR
ln0AoI6ofTBZUIccCHP7qfr6kfMVJPbb
=VD82
-----END PGP SIGNATURE-----

 
-------------------------------------------------------------------------
The following was automatically added to this message by the list server:

To learn more about Micronet, including how to subscribe to or unsubscribe from its mailing list and how to find out about upcoming meetings, please visit the Micronet Web site:

http://micronet.berkeley.edu

Messages you send to this mailing list are public and world-viewable, and the list's archives can be browsed and searched on the Internet.  This means these messages can be viewed by (among others) your bosses, prospective employers, and people who have known you in the past.