[3735] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Re : Any internet virus (fwd)

daemon@ATHENA.MIT.EDU (Tim O'Shea [tmo])
Fri Dec 6 17:16:02 1996

Date: Fri, 6 Dec 1996 14:25:29 -0500 (EST)
From: "Tim O'Shea [tmo]" <tmoshea@mailbox.syr.edu>
cc: www-security@ns2.rutgers.edu
In-Reply-To: <199612060854.IAA27692@argon.dcs.kcl.ac.uk>
Errors-To: owner-www-security@ns2.rutgers.edu



On Fri, 6 Dec 1996, Security mailing listr  user wrote:

> But can't you do some "interesting" things with ANSI escape sequences?, I
> know there was a lot of fuss about this in the PC world a few years ago,
> which resulted in a lot of ppl removing ANSI.SYS from the config.sys file.

This is true.  Text files could be created with ANSI escape sequences such
that when a user did the following:

more < file.txt
or
type file.txt

The escape codes would be processed by ansi.sys and could redefine keys to
run commands such as 'format c:' unbeknownst to the user.  

This is completely removed from transmisson of viruses through ASCII email
the ansi.sys scenario is more of a trojan.  No infection capabilities.

PLEASE!  Let's remove discussion of virus hoaxes from the www-security
list.  To date, there is no proven way of sending a virus via a text file.

The only effect of these "HOAX" postings is to raise false fears, waste
time and system resources.


Please direct any questions or replies to me personally...
Tim


home help back first fref pref prev next nref lref last post