lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1105920036.4619.0.camel@Stargate>
From: nodialtone at comcast.net (Byron Copeland)
Subject: Wide spread DSV

LMAO!  Good done.

On Sun, 2005-01-16 at 18:17, RandallM wrote:
>  
> Problem: Down Syndrome Virus (DSV)
> Affected devices: Various web, internet, intranet and PC's.
> Severity: DOA (Denial of Access).
> Author: Ima Notserious 
> Warnings: Elevated
> Fix: At present no available fixes.
> 
> :::::::::::::::::::::::::::::::::::::
> Overview:
> 
> Many users have been reporting various sites to be "down". 
> This has a wide spread effect and can be found 
> across the internet and intranets. The DSV has even been
> reported to effect PC's and other devices
> 
> ::::::::::::::::::::::::::::::::::::::
> Details:
> 
> Internet/Intranet: When user clicks on links or types in addresses
> browsers hesitate then display 404 messages.
>  
> PC's: When power buttons are used to start PC, expected 
> operating systems fail to load with various failed messages.
> 
> ::::::::::::::::::::::::::::::::::::::
> Reason for Elevated Warnings: 
> 
> The DSV was elevated do to the infection spreading to a PC. 
> A researcher found this after visiting one of the reported "down" sites. 
> After reboot of PC, the PC failed to load. The site in question was
> Amazon.COM.
> 
> ::::::::::::::::::::::::::::::::::::::
> Fix: 
> 
> At present researchers are conducting various tests to find out 
> how the DSV infects, the mechanism used to spread and 
> what if any fixes are available. It has been reported that the 
> possible spread is thru port 25. At present some service providers
> have begun to test this by blocking the port. 
> 
> ::::::::::::::::::::::::::::::::::::::
> Work around:
> 
> Do not visit any sites on internet or intranets. Do not turn PC's off if you
> 
> have recently visited any sites on the Web.
> 
> 
> 
> Advisory by: WorldWideWatchers.Inc
> Copyright (c) 2004 WWW.Inc
> 
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
-- 
Byron Copeland
www.virtualondemand.com

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20050116/9f2b5fd5/attachment.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ