Potential Microsoft PCT worm (MS04-011)
A revised exploit has been released for the PCT flaw in the last 24-hrs by
THC (THCIISSLame.c). For the last few hours we have also been receiving
uncorroborated anecdotal evidence from reliable sources that a working worm
is being trialled on the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
The only relevant lines in your advisory are:
| A revised exploit has been released for the PCT flaw in the last 24-hrs by
| THC (THCIISSLame.c). For the last few hours we have also been receiving
And the information can be found at:
!-- This advisory below however is not from Microsoft,--
it is an 'official' Microsoft alert though :(
news://news.microsoft.com/[EMAIL PROTECTED]
not that anyone really cares :)
--
http://www.malware.com
___
Full-Disclosure - We believe in
-Original Message-
From: Gadi Evron [mailto:[EMAIL PROTECTED]
Sent: Friday, April 23, 2004 3:59 PM
To: advisories
Cc: [EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] Potential Microsoft PCT worm (MS04-011)
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
You should be more
.
Exibar
-Original Message-
From: insecure [mailto:[EMAIL PROTECTED]
Sent: Friday, April 23, 2004 5:40 PM
To: Gadi Evron
Cc: advisories; [EMAIL PROTECTED]
Subject: [inbox] Re: [Full-Disclosure] Potential Microsoft PCT worm
(MS04-011)
Gee, the advisory from Corsaire caused a lot of panic
-- snip --
A lot of panic and alarm over something that initially states
uncorroborated anecdotal evidence...?? That seems to be a very strong
response given the indicators... What do you folks do when an official alert
arrives from the vendor?
-- snip --
Unplug the internet line?
or... unplug
# start snip
- Microsoft ( ... ) continues to urge all customers to immediately install
the MS4-011 update ( ...)
- Customers who are still evaluating and testing MS04-011 should immediately
implement the workaround steps detailed for the PCT/SSL vulnerability
detailed in the MS04-011. In