TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Rich Gauszka
from: Ellen K.
date: 2004-11-14 23:00:14
subject: Re: new SQL Server exploit?

From: Ellen K. 

No stake through the heart of that particular vampire, eh?



On Sun, 14 Nov 2004 22:03:29 -0500, "Rich Gauszka"
 wrote in message :

>The W32.SQLExp.Worm may be making the rounds again on unpatched SQL/MSDE
>systems
>
>http://securityresponse.symantec.com/avcenter/venc/data/w32.sqlexp.worm.html#t
hreatassessment
>
>
>"Geo"  wrote in message
news:419806fa{at}w3.nls.net...
>> haven't seen any mention of something new.
>>
>>
>> "Ellen K."
 wrote in message
>> news:ii1gp096982hoe8d9ic0pspaj6d7q81gq2{at}4ax.com...
>>> I am seeing attempted inbound UDPs to port 1434 today.
>>
>>
>

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270 5030/786
@PATH: 379/45 1 396/45 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.