I can say about this that your offsets are probably different than those in worm exploit code. So, you are not vulnerable to dumb worm static exploit way. But it doesn't mean that there is no guy that would install his redhat with configuration close to yours just to find correct offset and get inside of your system. Chance is pretty little, but there is still a chance.
On Wed, 25 Sep 2002, Schmehl, Paul L wrote: > > But there's no evidence of any failures, no .bugtraq.c on the server, no port 2002 >opened up for communications. No "complaints" from any of my defense systems. >Nothing to indicate the the worm got in. > > Paul Schmehl ([EMAIL PROTECTED]) > Project Coordinator > University of Texas at Dallas > http://www.utdallas.edu/~pauls/ > AVIEN Founding Member > _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
