Full Disclosure mailing list archives
Re: RE: SQL Slammer - lessons learned
From: "I.R. van Dongen" <vdongen () hetisw nl>
Date: Mon, 10 Feb 2003 17:26:20 +0100 (CET)
Huh? Our IDSes detect both Code Red I, II and III and Nimda every day, as does my Wormcatcher. I don't know *anyone* who is blocking port 80. Do you?
accually, the rotterdam area of chello ISP blocks port 80. They started blocking that when code red 1 almost took their internal network down. Which meanth for *nix users, that first came the flood of requests that came with code red, then their port 80 was suddenly unreachable. So instead of warning non-patching users, they block all users.
Paul Schmehl (pauls () utdallas edu) Adjunct Information Security Officer The University of Texas at Dallas http://www.utdallas.edu/~pauls/ AVIEN Founding Member _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- RE: SQL Slammer - lessons learned, (continued)
- RE: SQL Slammer - lessons learned Schmehl, Paul L (Feb 09)
- Re: SQL Slammer - lessons learned Helmut Springer (Feb 09)
- RE: SQL Slammer - lessons learned Steve Wray (Feb 09)
- Re: SQL Slammer - lessons learned Helmut Springer (Feb 09)
- RE: SQL Slammer - lessons learned John . Airey (Feb 10)
- RE: SQL Slammer - lessons learned John . Airey (Feb 10)
- Re: SQL Slammer - lessons learned David Howe (Feb 10)
- RE: SQL Slammer - lessons learned Schmehl, Paul L (Feb 10)
- Re: SQL Slammer - lessons learned David LaPorte (Feb 10)
- Re: SQL Slammer - lessons learned Karl DeBisschop (Feb 10)
- Re: SQL Slammer - lessons learned David LaPorte (Feb 10)
- Re: SQL Slammer - lessons learned petard (Feb 10)
- Re: RE: SQL Slammer - lessons learned I.R. van Dongen (Feb 10)
- RE: SQL Slammer - lessons learned Schmehl, Paul L (Feb 09)