Avast Zero-Day Exploit

I have couple PCs on Avast 2015…but many still on Avast 9.0.2021 (last stable version).
Avast says they support V9 but obviously no more development.
In fact, I’m guessing Avast 2016 (now in BETA) will replace more development on V2015 soon.
Anyway, I found this article on Zero-Day Exploit of HTTPS
http://news.softpedia.com/news/zero-day-exploit-found-in-avast-antivirus-493958.shtml
…and I assume Avast used the Emergency Update in Task scheduler to update V2015 Users ? …if so, how do you know ?
If so, any chance they did for V9 as well ?

I’ve been waiting for 2016 to launch and do mass upgrade across the board…I like to do clean uninstall & clean install on new PCs so not trivial effort.

Anyway, any insights on what has or has not been done…no conjecture please ( save your post time of “always upgrade to latest to be protected” :slight_smile: )…is most appreciated.

Regards.

This is a old news.you are late in the Party.This is discussed earlier.Avast! is work on a Patch :slight_smile:

Actually, Avast was patched via a virus definition update this time.
Avast 9 doesn’t contain the functionality (HTTPS scanning) at all, so there’s nothing to patch there.

(Technically, this has little to do with the HTTPS scanning itself - it’s basically “just” a GUI problem, even though that doesn’t make the problem any less important of course.)