[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <001201c3605c$aac0b6c0$250a640a@navi>
From: gml at phrick.net (gml)
Subject: DCOM Worm released
Today will go down in history as the day the whole damned world got owned.
I have so many machines infected with so many things it's insane.
I'll be reverse engineering until 2004.
-----Original Message-----
From: full-disclosure-admin@...ts.netsys.com
[mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of Dennis Opacki
Sent: Monday, August 11, 2003 5:41 PM
To: Full-Disclosure (E-mail)
Subject: Re: [Full-Disclosure] DCOM Worm released
Can anyone confirm whether the tftp transfers appear to be solely from the
hosts listed in the initial sans.org note (which now appear to have been
taken down), or is the transfer done from the infecting host?
TIA,
-Dennis
On Mon, 11 Aug 2003, Joey wrote:
> They found a worm, but since it uses tftp servers that
> can be taken down and since tftp is slow, it shouldnt
> have much of an effect.
>
> "Scans sequentially for machines with open port 135,
> starting at a presumably random IP address" - very
> stupid way to spread!
>
> http://isc.sans.org/diary.html?date=2003-08-11
>
> __________________________________
> Do you Yahoo!?
> Yahoo! SiteBuilder - Free, easy-to-use web site design software
> http://sitebuilder.yahoo.com
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists