[58929] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Bugbear.b (worm du jour)

daemon@ATHENA.MIT.EDU (Eric Anderson)
Thu Jun 5 22:10:20 2003

Date: Thu, 5 Jun 2003 19:09:46 -0700
From: Eric Anderson <anderson@cs.uoregon.edu>
To: Jack Bates <jbates@brightok.net>
Cc: nanog@merit.edu
Mail-Followup-To: Jack Bates <jbates@brightok.net>, nanog@merit.edu
In-Reply-To: <3EDFF47B.8030706@brightok.net>; from jbates@brightok.net on Thu, Jun 05, 2003 at 08:55:07PM -0500
Errors-To: owner-nanog-outgoing@merit.edu


Maybe I should clarify:  By "very slowly" I meant that this should spread
significantly more slowly than something which is able to exploit a
vulnerability and start executing as soon as it finds a susceptible host.  If
it's been in the wild for 12 hours without compromising most of the vulnerable
hosts, that's slow relative to what's possible.

Thus spake Jack Bates (jbates@brightok.net):

[snip]
 
> 
> That is a very bad assumption to make. Not all AV software can detect 
> the various variations of it yet. In addition, there are many EU's that 
> will still run any executable that shows up in their inbox. Many reports 
> of the Microsoft Patch scam being used with this one.
> 
> It is multi-part mime, so my current stripping methods will protect the 
> mailboxes on my system.
> 
> -Jack


home help back first fref pref prev next nref lref last post