lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 27 Jan 2006 14:52:53 -0800 (PST)
From: Charles Cala <charles_cala@...oo.com>
To: dudevanwinkle@...il.com
Cc: funsec@...uxbox.org, full-disclosure@...ts.grok.org.uk,
	bugtraq@...urityfocus.com
Subject: Re: Urgent Alert: Possible BlackWorm DDay February
	3rd (Snort signatures included)




--- Dude VanWinkle <dudevanwinkle@...il.com> wrote:
> 
> Why do you call a .scr you have to manually install a "worm"? 

http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp
 "
A worm is similar to a virus by its design, and is considered to be a sub-class of a virus. Worms
spread from computer to computer, but unlike a virus, it has the ability to travel without any
help from a person. A worm takes advantage of file or information transport features on your
system, which allows it to travel unaided.
"

BlackWorm has a LAN infection vector.

No action on the part of the user of the 
box on the LAN must happen for them to "get got",
thus this is a worm.

-charles

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ