[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4136BD30.8000005@paradigmo.com>
From: stephane.nasdrovisky at paradigmo.com (stephane nasdrovisky)
Subject: Viral infection via Serial Cable
Most viruses use the user (they expect to contact a stupid user which
will execute it), they don't care how it reached your pc, it knows the
user will spread it somehow (i.e. it's a nice porno exe which will be
sent to friends, ...). Current viruses do not even need user
interaction, some expect to contact a stupid user who's using some
outlook flavor.
The worms are using servers and their vulnerabilities (and the admin
lazyness), ip or higher level email features.
Current viruses and worms are not very different as they do not always
need user action. Some viruses could be called worms as they spread
automatically, using server features of some clients.
Back in the 80s and early 90s, I was using fidonet (a modem/rs232 based
network), file and email transfers were automatic (using a software like
binkley term). There were no known way for automatically execute the
files you received (outlook or outlook express did not exist, not even
windows nt, just msdos), but viruses were working anyway. It was the
begining of companies like mcafee! That was the time I first checked my
executables before executing anything on my PC.
?ber GuidoZ wrote:
>James Tucker said:
>
>
>>4. Most viruses in circulation today use TCP/IP or higher level
>>protocols, not native RS232.
>>
>>
>
>AND
>
>
>
>>Personally I never saw or heard of a virus which tries to communicate
>>with another computer attached to an RS232 port (maybe a laplink
>>virus or the like??), as this is an unusual scenario.
>>
>>
>
>Exactly the point I was trying to make. Nothing more, nothing less.
>
>
I too never heard such a think, which doesn't mean:
-such a virus/worm does not exist
-the software on any side of the rs232 link is not vulnerable (I guess
the risk will not come from a virus/worm but a targeted attack by
someone knowing the vulnerabilities of this soft and also knowing your
network infrastructure and that you have this soft)
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040902/5046e5d1/attachment.html
Powered by blists - more mailing lists