> IIRC, the RTM worm worked by exploiting a buffer overflow in > fingerd on > VAX systems and debug mode in sendmail on Sun boxes; it > therefore would > not have done anything to VM systems, if there were any it hit. > However, I don't know if it came a-knockin' to any of those systems or > not.
Oh, it did. And was soundly rejected. Long long ago, in a galaxy far far away....(music rolls) During the RTM first release, rice.edu was a Sun 2, and ricevm1 (then known as icsa.rice.edu) was IBM TCP 1.3. The worm came in, infected iapetus.rice.edu (a Vax running 4.3BSD), bounced to hit rice.edu and bombed because it didn't know what to do with a Sun 2, and also tried to hit icsa.rice.edu. We got a copy in captivity on rice.edu and icsa.rice.edu, and used that to disarm and filter it. VM SMTP didn't even blink at it -- even in it's ancient and primitive state at the time. Matt Korn coded better than he knew...8-) It was a fun 24 hours. -- db
