-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
At 4:17 PM -0500 8/5/01, Les Mikesell wrote:
>The descriptions I've seen indicate that it has a flaw in
>the attempt to pick random targets. It always uses the
>same seed so every instance runs through the same addresses
>in the same order. That means you will get hit by the same
That was version 1. Version 2 (during the first attack) fixed that.
And we are now at a completely new generation of the worm which uses
the same basic method, but has much deadlier payloads.
More to the point, the people who are running vulnerable servers are
very likely (an some tests have verified this) to be vulnerable to
other attacks--so they definitely need a wakeup call.
- --
Kee Hinckley - Somewhere.Com, LLC
http://consulting.somewhere.com/
I'm not sure which upsets me more: that people are so unwilling to accept
responsibility for their own actions, or that they are so eager to regulate
everyone else's.
-----BEGIN PGP SIGNATURE-----
Version: PGP Personal Security 7.0.3
iQA/AwUBO26PjCZsPfdw+r2CEQLuAwCgr32ufjACaRBILNFnpQMAAv2RDOYAmQEJ
e/zI1wtQn/Ik0OE2YcFyfZ++
=Hyi4
-----END PGP SIGNATURE-----