lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <001f01c36050$45f1f1c0$2002a8c0@vector>
From: rober at videotron.ca (Robert Ersoni)
Subject: msblast.exe

Here is the latest on this from McAfee and Trend.

http://us.mcafee.com/virusInfo/default.asp?id=description&virus_k=100547


http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_MSB
LAST.A 


Rob.


-----Original Message-----
From: full-disclosure-admin@...ts.netsys.com
[mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of David
Vincent
Sent: August 11, 2003 4:37 PM
To: 'Full-Disclosure (E-mail); Bugtraq (E-mail); Incidents (E-mail)
Subject: [Full-Disclosure] msblast.exe

i've just got a copy of this exe.  it matches the MD5 at
http://isc.sans.org/diary.html?date=2003-08-11 of
5ae700c1dffb00cef492844a4db6cd69.  that's the EXE's MD5, not the
unpacked
version or the MD5 of the ZIP i received it in.

we've got NAV Corporate 8.00.0.9374 with scan engine 4.1.0.15 and
definitions of 06/08/2003 rev. 4 (the most current at this time) and it
is
not detected.

David Vincent  CNA/MCSE
Network Administrator

www.mightyOaks.com
david.vincent@...htyoaks.com


MIGHTY OAKS WIRELESS SOLUTIONS INC.
209-3347 Oak Street
Victoria, B.C. Canada V8X 1R2 
Phone: 250.386.9398   Fax:  250.386.9399
Pager: 250.380.4575   Cell: 250.884.3000
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ