Full Disclosure mailing list archives

RE: When do exploits get used?


From: "Bill Royds" <full-disclosure () royds net>
Date: Mon, 22 Mar 2004 22:07:43 -0500

My daughter had to re-install part of Windows XP from CD because of some
disk problems. She forgot to take the machine off the Internet while doing
it and was infected immediately by MSBlaster as soon as the CD restored some
older DLL code.
   I wonder if anyone has actually newly connected to the Internet in the
last 6 months. Anybody buying a new XP computer that has a network
connection will be infected by MSBlaster and find their machines almost
unusable. People on this list would probably know how to disable the reboot
for RPCS using the Service manager, but most home users would have no idea
how to fix the problem. I wonder how many computers are sitting there
rebooting every few minutes because of blaster and no one knows what to do

-----Original Message-----
From: full-disclosure-admin () lists netsys com
[mailto:full-disclosure-admin () lists netsys com] On Behalf Of Luke Scharf
Sent: March 22, 2004 5:32 PM
To: Jay Beale
Cc: Paul Schmehl; full-disclosure () lists netsys com
Subject: Re: [Full-disclosure] When do exploits get used?

On Mon, 2004-03-22 at 17:13, Jay Beale wrote:
You may find this discussion academic.  But the exploit writers and the 
worm writers are getting faster.  And that's what should scare us into 
moving beyond patches.  That's what should get us moving to better 
network and host configurations.  That's what should get us to evaluate 
patching as, at most, the easy, but most critical, 50%.

I would say that we could all agree that not patching is a recipe for
disaster -- and that it's very easy to keep up to date. 

But, my 90% figure comes from the accidental plugging of unpatched
Windows machines into the open network.  Every time I do that, the
machine is running msblast in a few minutes.  And as near as I tell,
it's not my machines that are doing it (except for that one unpatched
machine that I spend an hour rebuilding)...

-Luke

-- 
Luke Scharf, Systems Administrator
Virginia Tech Aerospace and Ocean Engineering

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Current thread: