Per Symantec, if you update signatures via the normal LiveUpdate automatic process, your product should not be vulnerable. Updated signatures were released two days ago. Threats with the UPX exploit code will be detected as: http://www.sarc.com/avcenter/venc/data/bloodhound.exploit.26.html This works because the signature detection engine can examine the code first, before exposing the vulnerable part of the UPX decomposer to the exploit. Of course, you probably still need to upgrade your software to the appropriate version, but it is not as bad as some have claimed (mea culpa) Roger ************************************************************************ *** *Roger A. Grimes, Banneret Computer Security, Computer Security Consultant *CPA, CISSP, MCSE: Security (NT/2000/2003/MVP), CNE (3/4), CEH, CHFI *email: roger@xxxxxxxxxxxxxx *cell: 757-615-3355 *Author of Malicious Mobile Code: Virus Protection for Windows by O'Reilly *http://www.oreilly.com/catalog/malmobcode *Author of Honeypots for Windows (Apress) *http://www.apress.com/book/bookDisplay.html?bID=281 ************************************************************************ ****