On Thu Jan 18, 2001 at 09:59:15AM -0800, Dave Sherman wrote:
> Since Mandrake is Redhat based, I would assume that we ARE vulnerable to
> the same attack, until and unless Mandrake publicly says otherwise.
> Hopefully Mandrake will announce something, one way or the other, soon.
Not true. While I haven't seen the worm itself to know for certain
one way or the other, I've been told it specifically targets RH 6.2
and 7.0 machines. This would leave other distributions alone.
*However*, since I wouldn't ask anyone to rely on that and/or use it
as an excuse, the simple response (for any distribution) is simple:
1) Subscribe to vendor security mailing lists. Announcement lists of
a security nature are generally small bandwidth with infrequent
posts.
2) Update update update!!! If an update is released, it's for *your*
health, not ours. We don't do this kind of work for fun (I know
I'd rather spend my time doing other things than back-porting fixes
to 6.0!). There is a reason why security updates are released.
In other words, all versions of Linux-Mandrake 6.0 to present *with
appropriate security updates applied* are not vulnerable.
I posted previously the relevant web pages that indicate the
vulnerabilities this worm takes advantage of have been fixed last year.
--
[EMAIL PROTECTED], OpenPGP key available on www.keyserver.net
1024D/FE6F2AFD 88D8 0D23 8D4B 3407 5BD7 66F9 2043 D0E5 FE6F 2AFD
- Danen Consulting Services www.danen.net, www.freezer-burn.org
- MandrakeSoft, Inc. Security www.linux-mandrake.com
Current Linux uptime: 1 day 18 hours 15 minutes.