TIP: Click on subject to list as thread! ANSI
echo: tech
to: MARTIN ATKINS
from: mark lewis
date: 2005-03-28 16:51:36
subject: rooted

ML>> are you aware of the slammer worm?

 MA> W32.SQLExp.Worm is a worm that targets the systems
 MA> running Microsoft SQL Server 2000, as well as
 MA> Microsoft Desktop Engine (MSDE) 2000. The worm sends
 MA> 376 bytes to UDP port 1434, the SQL Server Resolution
 MA> Service Port.

 MA> What has this got to do with me operating as root
 MA> with Linux?

it may be possible that something similar may attack your system in a
similar manner... if it happens to beat on something that you are running
in userspace as root on that port, it is possible that it could get in or
open up other venues of access... and being as you are running as root,
getting rooted could be more easily accomplished...

ML>> what about code red or

 MA> Web servers utilizing the IIS server on Windows NT and
 MA> Windows 2000 with the index server or indexing service
 MA> enabled.

 MA> What has this got to do with me operating as root with Linux?

the point is that they do not arrive via spam... they move via several
other methods...

ML>> nimda?

 MA> Nimda Worm
 MA> Systems running Microsoft Windows 95, 98, ME, NT, and 2000

 MA> What has this got to do with me operating as root with Linux?

see above... they do not arrive via spam... one of them does have that
capability, though...

[trim]

 MA> I welcome input from anyone regarding security but before you
 MA> put in your two penny worth could you at least do a little
 MA> research an not waste my time.

research on what? i gave examples of critters that move and
infect without using SPAM as their avenue of attack... i'm making
that point because you specifically are limiting your statements
to SPAM and how you dump it in the trash... my point is that SPAM
is only one avenue of infection... there are others that are
already being exploited and i'm positive there are a whole passel
of others just waiting to be discovered...

)\/(ark

* Origin: (1:3634/12)
SEEN-BY: 633/267 270
@PATH: 3634/12 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.