[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <Pine.LNX.4.33.0209261104100.27239-100000@cerber.no>
From: misha at cerber.no (Mikhail Iakovlev)
Subject: The last word on the Linux Slapper worm
I can say about this that your offsets are probably different than those
in worm exploit code. So, you are not vulnerable to dumb worm static
exploit way. But it doesn't mean that there is no guy that would install
his redhat with configuration close to yours just to find correct offset
and get inside of your system. Chance is pretty little, but there is still
a chance.
On Wed, 25 Sep 2002, Schmehl, Paul L wrote:
>
> But there's no evidence of any failures, no .bugtraq.c on the server, no port 2002 opened up for communications. No "complaints" from any of my defense systems. Nothing to indicate the the worm got in.
>
> Paul Schmehl (pauls@...allas.edu)
> Project Coordinator
> University of Texas at Dallas
> http://www.utdallas.edu/~pauls/
> AVIEN Founding Member
>
Powered by blists - more mailing lists