"Because Symantec uses a filter driver to intercept all system I/O, just emailing a file to a victim or sending them a link to an exploit is enough to trigger it - the victim does not need to open the file or interact with it in anyway." — Worse than that. Apparently,Tavis emailed the exploit to Symantec in a password protected zip file. He included the password in the body of the email. The email server, running Symantec, grabbed the password out of the email, decrypted the zip file, and upon reading the exploit code, crashed itself. https://news.ycombinator.com/item?id=11998961
вторая часть, похоже, апокриф, но очень смешно ‎- a smooth, easy, fun
(последние два слова должны были быть "became enlightened"!) ‎- 9000
вторая часть - это первый комментарий этого Тревиса в багтрекере: https://bugs.chromium.org/p/project-zero/issues/detail?id=820 ‎- newtover
ну он это предположил, нет свидетельства из Симантека ‎- a smooth, easy, fun