Full Disclosure mailing list archives
RE: MS should point windowsupdate.com to 127.0.0.1
From: Steffen Kluge <kluge () fujitsu com au>
Date: Fri, 15 Aug 2003 18:50:33 +1000
On Fri, 2003-08-15 at 09:50, Jeroen Massar wrote:
And no, this is not just yet again a microsoft thing apparently even the FSF can't secure their FTP server. Which took 3 months to be detected (jolly :) one has to wonder how much trouble that is going to cost, though fortunatly most unix admins are more proactive in the security front and tend to update.
The difference, though, is that they got rooted in the week between disclosure of the ptrace bug and publication of a patch. For that, you can't call them lazy. The interesting question here is, how could the attacker get an account on the box the first place? Disgruntled insider? Poor account/password management? Non-root remote exploit? I think that even after patching the Linux kernels on their servers, the FSF admins still have some catching up to do. Cheers Steffen.
Attachment:
signature.asc
Description: This is a digitally signed message part
Current thread:
- msblast DDos counter measures B3r3n (Aug 14)
- MS should point windowsupdate.com to 127.0.0.1 Tobias Oetiker (Aug 14)
- RE: MS should point windowsupdate.com to 127.0.0.1 Jeroen Massar (Aug 14)
- RE: MS should point windowsupdate.com to 127.0.0.1 Steffen Kluge (Aug 15)
- RE: MS should point windowsupdate.com to 127.0.0.1 Jeroen Massar (Aug 14)
- RE: msblast DDos counter measures Marc Maiffret (Aug 14)
- RE: msblast DDos counter measures Laurent LEVIER (Aug 15)
- MS should point windowsupdate.com to 127.0.0.1 Tobias Oetiker (Aug 14)