Re: [Full-Disclosure] AV feature does more DDoS than Sobig

2003-08-29 Thread William Warren
nice point.. While very few are willing or able to take the draconian measures i am taking..two things..what i will be doing when i turn on the virus wall is implement a whitelistif you are on my whitelist..the mail gets dropped before it gets scanned. Any .compressed files will go into

[Full-Disclosure] MDKSA-2003:087 - Updated gkrellm packages fix remote arbitrary code executeion vulnerability

2003-08-29 Thread Mandrake Linux Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Mandrake Linux Security Update Advisory Package name: gkrellm Advisory ID:

RE: [Full-Disclosure] AV feature does more DDoS than Sobig

2003-08-29 Thread Steve Wray
Yeah likewise, it looks as if the attachment didnt' go thru. You can put this down to one or more of; (in order of decreasing plausibility) 1. It was early in the morning and I wasn't paying attention. or 2. I had a twinge of conscience and decided not to attach it. 3. The list admins must have

Re: [Full-Disclosure] GOOD: A legal fix for software flaws?

2003-08-29 Thread Darren Reed
In some mail from [EMAIL PROTECTED], sie said: There's just one little problem with your logic: Unless the law specifically prohibits disclaimer of liability, there's no= thing illegal about a clause that does so. And in the best be careful what yo= u wish for, as you may get it, you

[Full-Disclosure] Selfmade worms in the wild ;)

2003-08-29 Thread Redaktion-Kryptocrew
Attention, that's joke-trash: http://de.trendmicro-europe.com/enterprise/security_info/ve_detail.php?id=55745VName=WORM_MSBLAST.G http://de.trendmicro-europe.com/enterprise/security_info/ve_detail.php?id=55756VName=WORM_MSBLAST.Z You can change id's and names... -mo- --

[Full-Disclosure] Authorities eye MSBlaster suspect

2003-08-29 Thread Larry Roberts
If they catch this guy how much you wanna bet they try and stick all the MSBlaster related damages to him and not just the .B related stuff? This idiotis going to pay big time for making a stupid copycat virus. The funnier thing would be if this was the guy tried to make the variant that

Re: [Full-Disclosure] Need contact in the BTOPENWORLD.COM security department

2003-08-29 Thread Stephen Clowater
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 If its really getting out of hand, I would just traceroute the customer and try to contact security departments starting at the isp and working your way back, notifying each link in the chain that their networks are being bogged down by these idoits

[Full-Disclosure] AWK Problem

2003-08-29 Thread Helmut Hauser
We encountered a strange AWK Problem. Problematic awk script command phrase on redhat 7.3 causing a DoS resulting in a complete system crash. If the file xyz.dat does not exist or is locked or file permission is denied with using awk, following offending phrase causes the crash: while

Re: [Full-Disclosure] Authorities eye MSBlaster suspect

2003-08-29 Thread Florian Weimer
Larry Roberts [EMAIL PROTECTED] writes: The funnier thing would be if this was the guy tried to make the variant that takes over your machine via the DCOM exploit and goes out the windowsupdate.com and downloads the fix. That would be hilarious!!! This worm (which isn't a variant of the

AW: [Full-Disclosure] AV feature does more DDoS than Sobig

2003-08-29 Thread vogt
form of SPAM perhaps, another viri form perhaps also, at least a by product of the original virus/trojan. Perhaps the best way to deal with these, since most everyone contacted, the originator and the AV vendor, are bit-bucketing all the e-mail responses to them, is to just promail

RE: [Full-Disclosure] Need contact in the BTOPENWORLD.COM securit y department

2003-08-29 Thread Peter Ellison
Try this :- http://www.btopenworld.com/helpnb/tech_enquiry#form1 at least this way you will get a Job Number for reference. regards Peter E. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of Birl Sent: 28 August 2003 20:27 To: [EMAIL PROTECTED] Subject: RE:

Re: [Full-Disclosure] Authorities eye MSBlaster suspect

2003-08-29 Thread Nick FitzGerald
Florian Weimer [EMAIL PROTECTED] replied to Larry Roberts: The funnier thing would be if this was the guy tried to make the variant that takes over your machine via the DCOM exploit and goes out the windowsupdate.com and downloads the fix. That would be hilarious!!! This worm (which

Re: [Full-Disclosure] Authorities eye MSBlaster suspect

2003-08-29 Thread Stephen Clowater
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Throw him in prison for a while...he caused alot of hedache, downtime, damage, and most importantly, the never ending msblaster thread on FD! Stupidity should be punished, this guy wrote a crappy worm, shot his mouth off about it, and then got

[Full-Disclosure] CIA Accused Of Bank Heist

2003-08-29 Thread Ver Zonnen
This sounded quite interesting, is that why they insisted on having a backdoor in encryption software? _ MSN 8 with e-mail virus protection service: 2 months FREE* http://join.msn.com/?page=features/virus

Re: [Full-Disclosure] Authorities eye MSBlaster suspect

2003-08-29 Thread 00005702
A news conference by the Seattle offices of the DOJ and FBI is scheduled for 1.30pm (9.30pm GMT) today. And this kid is dumb enough be be living in the U.S.A. man, when are people going to learn, next we will here that he has been charged with every penny the worm caused and will be sentence

[Full-Disclosure] [TURBOLINUX SECURITY INFO] 29/Aug/2003

2003-08-29 Thread Turbolinux
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 This is an announcement only email list for the x86 architecture. Turbolinux Security Announcement 29/Aug/2003 The following

Re: [Full-Disclosure] Authorities eye MSBlaster suspect

2003-08-29 Thread Charles Ballowe
On Fri, Aug 29, 2003 at 12:14:51PM -, [EMAIL PROTECTED] wrote: And this kid is dumb enough be be living in the U.S.A. man, when are people going to learn, next we will here that he has been charged with every penny the worm caused and will be sentence under the new and ever improving

[Full-Disclosure] Blaster.B/LovSan writer arrested

2003-08-29 Thread Chad Boeckmann
The writer of the MS Blaster.B variant has been arrested in Hopkins, MN. http://www.startribune.com/stories/789/4068796.html Full story below: Authorities arrest Minnesota teen in Internet attack Ted Bridis, Associated Press Published August 29, 2003 INET30 WASHINGTON -- U.S. cyber

Re: [Full-Disclosure] Authorities eye MSBlaster suspect

2003-08-29 Thread morning_wood
if the worm was active in anticipation of a patch that intoduced a new exploit vector and it took advantage of that, is'nt the vendor ( microsoft ) to blame then? As well there was plenty of advanced warning on this exploit long before msblast was an issue. It seems to me that it is each admins

RE: [Full-Disclosure] Authorities eye MSBlaster suspect

2003-08-29 Thread Rainer Gerhards
Interesting -- the net cost of the worm is actually a net $0.00. For every penny that a company chalks up as a cost to the worm, some other company must be chalking up the cost as a profit from the worm. Actually not - the profit is with the individuals who are paid by the companies and

[Full-Disclosure] Gator droppings

2003-08-29 Thread morning_wood
look.. a gator ! http://webpdp.gator.com/4/ interesting... ( clicks on a gators back ) http://webpdp.gator.com/4/placements.inc http://webpdp.gator.com/4/messages.inc http://webpdp.gator.com/4/common/codes.inc http://webpdp.gator.com/4/message/1/ bored, MrWood

Re: [Full-Disclosure] Authorities eye MSBlaster suspect

2003-08-29 Thread madsaxon
At 09:18 AM 8/29/03 -0700, morning_wood wrote: this can be seen everywhere in todays American society... commonly refered as to the poor me syndrome.. Personal responsibility is dead, and I'll sue the pants off anyone who says otherwise. Microsoft made me type that. ;-) m5x

[Full-Disclosure] RIP: ActiveX controls in Internet Explorer?

2003-08-29 Thread Richard M. Smith
Hi, As everyone knows, ActiveX controls and the OBJECT tag has been a big source of security holes in Internet Explorer. However, it looks like support for ActiveX controls is going to be removed from Internet Explorer. A small company called Eolas recently won a $521 million judgment against

Re: [Full-Disclosure] Authorities eye MSBlaster suspect

2003-08-29 Thread Rob Carlson
On Friday, Aug 29, 2003, at 11:23 America/New_York, Charles Ballowe wrote: Interesting -- the net cost of the worm is actually a net $0.00. For every penny that a company chalks up as a cost to the worm, some other company must be chalking up the cost as a profit from the worm. Corporate

Re: [Full-Disclosure] Authorities eye MSBlaster suspect

2003-08-29 Thread Jeremiah Cornelius
Stephen Clowater wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Throw him in prison for a while...he caused alot of hedache, downtime, damage, and most importantly, the never ending msblaster thread on FD! Stupidity should be punished, this guy wrote a crappy worm, shot his mouth off

[Full-Disclosure] .inc injection

2003-08-29 Thread fockertrip
see this http://www.fal.br/noticias/index.asp?vCod=-536026309 and after this see this one http://www.fal.br/noticias/?vCod=iptosomething http://www.fal.br/noticias/../legba/incs/materias.inc Microsoft OLE DB Provider for ODBC Drivers erro '80040e10' [Microsoft][Driver ODBC para Microsoft

Re: [Full-Disclosure] GOOD: A legal fix for software flaws?

2003-08-29 Thread Jeremiah Cornelius
Darren Reed wrote: I, for one, would not cry if the law made it impossible to sell or provide GPL'd software to people because it could not be provieded with a disclaimer. Sooner or later the software industry needs to grow up and take responsibility for the crap that it unloads onto the world,

Re: [Full-Disclosure] Authorities eye MSBlaster suspect

2003-08-29 Thread Ben Nelson
You need to keep in mind that affected != infected. Many of us admins who don't even administrate a single windows box were affected by amount of bandwidth consumed by people who were infected. This thing effectively created a denial of service on many networks and any host trying to use that

RE: [Full-Disclosure] Authorities eye MSBlaster suspect

2003-08-29 Thread Chris DeVoney
On Friday, August 29, 2003 8:24 AM, Charles Ballowe wrote: Interesting -- the net cost of the worm is actually a net $0.00. For every penny that a company chalks up as a cost to the worm, some other company must be chalking up the cost as a profit from the worm. Forgive the comment, but

RE: [Full-Disclosure] Authorities eye MSBlaster suspect

2003-08-29 Thread Jerry Heidtke
Except that teekid had nothing to do with either the original Blaster worm (which is apparently what Stephen Clowater assumed) or Nachia/Welchia/Blaster.D, which is the worm Jeremiah Cornelius refers to. Here's the whois for his domain: Domain: t33kid.com Registrant (JP397-IYD-REG) Jeff

Re: [Full-Disclosure] Authorities eye MSBlaster suspect

2003-08-29 Thread Daniel C. Sobral
Not to mention that blaming a person for not being bullet proof when the murderer pulls the trigger is, well, stupid. Anyone thinking that way is in serious denial or in need of a reality check. Ben Nelson wrote: You need to keep in mind that affected != infected. Many of us admins who don't

RE: [Full-Disclosure] Authorities eye MSBlaster suspect

2003-08-29 Thread Schmehl, Paul L
-Original Message- From: Ben Nelson [mailto:[EMAIL PROTECTED] Sent: Friday, August 29, 2003 11:57 AM To: morning_wood Cc: [EMAIL PROTECTED] Subject: Re: [Full-Disclosure] Authorities eye MSBlaster suspect You need to keep in mind that affected != infected. Many of us admins

RE: [Full-Disclosure] Authorities eye MSBlaster suspect

2003-08-29 Thread Schmehl, Paul L
-Original Message- From: morning_wood [mailto:[EMAIL PROTECTED] Sent: Friday, August 29, 2003 11:19 AM To: Charles Ballowe; [EMAIL PROTECTED] Subject: Re: [Full-Disclosure] Authorities eye MSBlaster suspect if the worm was active in anticipation of a patch that intoduced a new

Re: [Full-Disclosure] Authorities eye MSBlaster suspect

2003-08-29 Thread morning_wood
shouldnt these measures been in place already? instead of rushing on a per-incident basis, you should be implimenting these things anyway. IMHO is prudent to expend some overkill during lockdown and penetration testing on a system when it is deployed or periodically tested, so there is a reduction

Re: [Full-Disclosure] Authorities eye MSBlaster suspect

2003-08-29 Thread Jeremiah Cornelius
Except that teekid had nothing to do with either the original Blaster worm (which is apparently what Stephen Clowater assumed) or Nachia/Welchia/Blaster.D, which is the worm Jeremiah Cornelius refers to. Great detail! Thanks. -- Jeremiah Cornelius

Re: [Full-Disclosure] Authorities eye MSBlaster suspect

2003-08-29 Thread morning_wood
So you would blame murder victims for being in the wrong place? Or rape victims for wearing the wrong clothing? Nice set of ethics there. NO !!! i think you mixed the top portion of my post with the poor me examples on the bottom, i blame the person that commits the act gimme a break,

RE: [Full-Disclosure] Authorities eye MSBlaster suspect

2003-08-29 Thread Schmehl, Paul L
-Original Message- From: morning_wood [mailto:[EMAIL PROTECTED] Sent: Friday, August 29, 2003 3:04 PM To: Schmehl, Paul L; [EMAIL PROTECTED] Subject: Re: [Full-Disclosure] Authorities eye MSBlaster suspect So you would blame murder victims for being in the wrong place? Or

RE: [Full-Disclosure] JAP back doored

2003-08-29 Thread Gary E. Miller
Yo Drew! On Mon, 25 Aug 2003, Drew Copley wrote: I suggest you do a google on CARNIVORE. ISPs are required to allow the FBI to jack in a CARNIVORE box to your net, so it can sniff everything, on request. Here is a court order requiring Earthlink to install a CARNIVORE.

RE: [Full-Disclosure] Authorities eye MSBlaster suspect

2003-08-29 Thread Jerry Heidtke
http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_MSB LAST.BVSect=S Trend's stat can be off by a factor of ten or more for very small infections. For Blaster.A, they say there were about 60,000; more likely there were between half a million and a million. For Blaster.B, they

Re: [Full-Disclosure] Authorities eye MSBlaster suspect

2003-08-29 Thread Anthony Saffer
snip What did I misconstrue? You stated that you believed that admins were at fault for worm infections. I quote, It seems to me that it is each admins responsiblity, if they were affected ( infected ) not the coder. Sorry for just jumping in here but I couldn't resist. Certainly, you have

[Full-Disclosure] Fw: Computers crashed just before blackout

2003-08-29 Thread Geoff Shively
Thanks Richard Cheers, Geoff Shively, CHO PivX Solutions, LLC http://www.pivx.com - Original Message - From: Richard M. Smith [EMAIL PROTECTED] To: [EMAIL PROTECTED]; 'Michael Scheidell' [EMAIL PROTECTED]; 'Alan Kloster' [EMAIL PROTECTED]; 'Geoff Shively' [EMAIL PROTECTED]; 'Drew

Re: [Full-Disclosure] Authorities eye MSBlaster suspect

2003-08-29 Thread morning_wood
my stance is that as a entity on the internet, it is the responsibility of the person or orginization that connects to a hostile enviroment to ensure themselves a reasonable ammount of protection. my murder analogy, applies to the ATTITUDE of said person/orginazation and the general internet

RE: [Full-Disclosure] Authorities eye MSBlaster suspect

2003-08-29 Thread Henry, Christopher M.
First of all as any admin or security person would know it is a pain in the ass trying to close all the possible point of infections on a real network. When your company is nation wide and you have mobile users/remote offices/clients who connect via vpn/ptp/frame relay into your network...why

RE: [Full-Disclosure] Authorities eye MSBlaster suspect

2003-08-29 Thread Brent Colflesh
I'm sure that the FBI would never exaggerate the extent of the damage, in order to look like they were busting a major hacker after a difficult investigation instead of some kid like millions of others with more time and anger than skills. Don't belittle the heroic efforts of the FBI - if you do,

Re: [Full-Disclosure] Authorities eye MSBlaster suspect

2003-08-29 Thread morning_wood
And has it occurred to you that *MAYBE* his high paying job would be more productive if he wasn't spending most of his time having to deal with people breaking in, either proactively or reactively?? that is his job Donnie - Original Message - From: [EMAIL PROTECTED] To: morning_wood

Re: [Full-Disclosure] AV feature does more DDoS than Sobig

2003-08-29 Thread Darren Reed
I dispute your claims and put it down to you dealing with things at a very small level with people who don't usually get much email. For over a week, I've been getting sobig email at a rate greater than 1 per minute to just myself at this address. That's over 1440 per day or close to 10,000 per

[Full-Disclosure] [SECURITY] [DSA 274-1] New node packages fix remote root vulnerability

2003-08-29 Thread debian-security-announce
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 274-1 [EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze August 29th, 2003