lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: tcpdumb at it-bytes.org (tcpdumb) Subject: DCOM RPC exploit (dcom.c) > However, a worm is N-E-V-E-R good and A-L-W-A-Y-S malicious. What would be the "good" intent of releasing any program that self-replicates to other vulnerable system and wreaks havoc? Well that's not entirely accurate. At least RaMeN had some nice features such as fixing the security hole it used to gain access to the vulnerable Host. ;) (Even if it's just a feature to prevent multiple attacks, it's basically a good idea)