[42636] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Worm probes

daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Tue Sep 18 15:20:03 2001

Message-Id: <200109181834.f8IIYHr11697@foo-bar-baz.cc.vt.edu>
To: sigma@pair.com
Cc: nanog@merit.edu
In-Reply-To: Your message of "Tue, 18 Sep 2001 13:36:48 EDT."
             <20010918173648.36769.qmail@smx.pair.com> 
From: Valdis.Kletnieks@vt.edu
Mime-Version: 1.0
Content-Type: multipart/signed; boundary="==_Exmh_-975033476P";
	 micalg=pgp-sha1; protocol="application/pgp-signature"
Content-Transfer-Encoding: 7bit
Date: Tue, 18 Sep 2001 14:34:17 -0400
Errors-To: owner-nanog-outgoing@merit.edu


--==_Exmh_-975033476P
Content-Type: text/plain; charset=us-ascii

On Tue, 18 Sep 2001 13:36:48 EDT, sigma@pair.com  said:
> Along those lines, weren't there some projects last time around to find and
> clean up the affected machines?  Clearly there are LOTS of vulnerable NT
> servers still out there.  Presumably these are being responded to just like

This also has an e-mail vector and a web DOWNLOAD vector.

There may be lots of vulnerable NT servers, but there's a lot MORE copies
of Outlook and Internet Explorer out there.

Think SirCam *AND* CodeRed *AND* the infect-a-surfer vector....
-- 
				Valdis Kletnieks
				Operating Systems Analyst
				Virginia Tech


--==_Exmh_-975033476P
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8
Comment: Exmh version 2.5 07/09/2001

iQA/AwUBO6eTqXAt5Vm009ewEQLAYQCgvr15GyIGOFpsnjMQ/hz3H52Vz00AoJrT
wkjSowQAHax3ISvquaO4c7RP
=dy36
-----END PGP SIGNATURE-----

--==_Exmh_-975033476P--

home help back first fref pref prev next nref lref last post