lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: jsage at finchhaven.com (John Sage)
Subject: Super Worm

hmm..

On Sat, Apr 17, 2004 at 09:57:19PM -0500, lists@...ecurity3.its.uiowa.edu wrote:
> From: lists@...ecurity3.its.uiowa.edu
> To: full-disclosure@...ts.netsys.com
> Subject: [Full-Disclosure] Super Worm
> Date: Sat, 17 Apr 2004 21:57:19 -0500 (CDT)
> 
> The Internet Storm Center handler's diary talks about a super worm
> that might explot several of the issues address in Tuesday's patches
> from Microsoft.  I've also heard some rumblings like that but
> haven't be able to confirm anything.

What it says is:

"Possible combined exploits of MS vulnerabilities"

"It has been a very quiet day, but we are hearing rumors of possible
'super' exploits that may target several of the vulnerabilities
announced by Microsoft on Tuesday. We've been contacted by an
individual who have have been infected such an exploit, but
investigation of this is still underway."


I'm not sure that "possible 'super' exploits" - plural - translates
literally into "super worm" - singular.

The only reason I bring this up is that within hours we'll probably be
seeing stories on news.google.com about "Experts say new Super Worm
threatens existence of Internet!"


- John
-- 
10 print "Home"
20 print "Sweet"
30 goto 10


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ