[42636] in North American Network Operators' Group
Re: Worm probes
daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Tue Sep 18 15:20:03 2001
Message-Id: <200109181834.f8IIYHr11697@foo-bar-baz.cc.vt.edu>
To: sigma@pair.com
Cc: nanog@merit.edu
In-Reply-To: Your message of "Tue, 18 Sep 2001 13:36:48 EDT."
<20010918173648.36769.qmail@smx.pair.com>
From: Valdis.Kletnieks@vt.edu
Mime-Version: 1.0
Content-Type: multipart/signed; boundary="==_Exmh_-975033476P";
micalg=pgp-sha1; protocol="application/pgp-signature"
Content-Transfer-Encoding: 7bit
Date: Tue, 18 Sep 2001 14:34:17 -0400
Errors-To: owner-nanog-outgoing@merit.edu
--==_Exmh_-975033476P
Content-Type: text/plain; charset=us-ascii
On Tue, 18 Sep 2001 13:36:48 EDT, sigma@pair.com said:
> Along those lines, weren't there some projects last time around to find and
> clean up the affected machines? Clearly there are LOTS of vulnerable NT
> servers still out there. Presumably these are being responded to just like
This also has an e-mail vector and a web DOWNLOAD vector.
There may be lots of vulnerable NT servers, but there's a lot MORE copies
of Outlook and Internet Explorer out there.
Think SirCam *AND* CodeRed *AND* the infect-a-surfer vector....
--
Valdis Kletnieks
Operating Systems Analyst
Virginia Tech
--==_Exmh_-975033476P
Content-Type: application/pgp-signature
-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8
Comment: Exmh version 2.5 07/09/2001
iQA/AwUBO6eTqXAt5Vm009ewEQLAYQCgvr15GyIGOFpsnjMQ/hz3H52Vz00AoJrT
wkjSowQAHax3ISvquaO4c7RP
=dy36
-----END PGP SIGNATURE-----
--==_Exmh_-975033476P--