lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <006301c2d38d$0507ec50$0400a8c0@GIS>
From: security at updegrove.net (Rick Updegrove (security))
Subject: [sean@...elan.com: Symantec detected Slammer worm "hours" before]

----- Original Message -----
From: "Len Rose" <len@...sys.com>
To: <full-disclosure@...ts.netsys.com>
Sent: Thursday, February 13, 2003 9:48 AM
Subject: [Full-Disclosure] [sean@...elan.com: Symantec detected Slammer worm
"hours" before]


> Wow, Symantec is making an amazing claim.  They were able to detect
> the slammer worm "hours" before.  Did anyone receive early alerts from
> Symantec about the SQL slammer worm hours earlier?

The first I heard of SQ_Hell (The first name given it by Geoff Shively of
http://www.pivx.com) was dated Jan 25 2003 7:11AM here:

http://online.securityfocus.com/archive/1/308306/2003-01-24/2003-01-30/2

I don't use symantec products so I wouldn't have gotten any notice from
them.  Someone else will have to verify that their notices went out before
Michael Bacarella's post.



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ