On Wed, 4 Apr 2001, [EMAIL PROTECTED] wrote:
> Sorry to be a pain, I'm coming in on this discussion half way through. I
> was just wondering, this worm has to be executed to infect, right? It
> relies on social engineering?
No. Worms traditionally exploit known vulnerabilities in network services
to propogate themselves.
In this case, the latest round of Linux worms have been exploiting known
vulnerabilities in imap, ftp, and dns services. THere have been security
updates available for all these vulnerable systems for months.
thornton
_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list