[82842] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Cisco IOS Exploit Cover Up

daemon@ATHENA.MIT.EDU (Stephen Fulton)
Fri Jul 29 19:58:32 2005

Date: Fri, 29 Jul 2005 19:58:10 -0400
From: Stephen Fulton <nanog@esoteric.ca>
To: nanog@merit.edu
In-Reply-To: <42EA92F3.50609@he.iki.fi>
Errors-To: owner-nanog@merit.edu


Petri Helenius wrote:

> Fortunately destructive worms don't usually get too wide distribution 
> because they don't survive long.

That assumes that the worm must "discover" exploitable hosts.  What if 
those hosts have already been identified through other means previously? 
    A nation, terrorist or criminal with the means could very well 
compile a relatively accurate database and use such a worm to attack 
specific targets, and those attacks need not be destructive/disruptive.

-- Stephen.

home help back first fref pref prev next nref lref last post