Full Disclosure mailing list archives
RE: When do exploits get used?
From: Michael Cecil <macecil () comcast net>
Date: Mon, 22 Mar 2004 23:01:43 -0600
At 09:07 PM 3/22/2004, Bill Royds said: >My daughter had to re-install part of Windows XP from CD because of some >disk problems. She forgot to take the machine off the Internet while doing >it and was infected immediately by MSBlaster as soon as the CD restored some >older DLL code.You should make her a slipstreamed copy of XP including all the XP updates to this point that she can use if she needs to reinstall again.
> I wonder if anyone has actually newly connected to the Internet in the >last 6 months. Anybody buying a new XP computer that has a network >connection will be infected by MSBlaster and find their machines almost >unusable. People on this list would probably know how to disable the reboot >for RPCS using the Service manager, but most home users would have no idea >how to fix the problem. I wonder how many computers are sitting there >rebooting every few minutes because of blaster and no one knows what to do.Not many I imagine. Vendors don't ship machines to customers with the unpatched 2001 verson of XP. Even small shops selling white boxes have enough sense to apply patches for their customers. Anyone capable of building their own computer certainly wouldn't be stopped by such problems.
I think the only possible continuing victims would be those who use their restore discs from 2001 to fix some problem. They would be likely candidates for infection. I guess if they didn't get updated restore discs, they'd be taking their machines into local computer shops or calling their vendors for help.
-- Michael Cecil macecil () comcast net http://home.comcast.net/~macecil/howto/ http://home.comcast.net/~antiviruscd/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- RE: Operating Systems Security, "Microsoft Security, baby steps", (continued)
- RE: Operating Systems Security, "Microsoft Security, baby steps" Schmehl, Paul L (Mar 18)
- RE: Operating Systems Security, "Microsoft Security, baby steps" Todd Burroughs (Mar 18)
- RE: Operating Systems Security, "Microsoft Security, baby steps" Luke Scharf (Mar 19)
- Re: Operating Systems Security, "Microsoft Security, baby steps" Nico Golde (Mar 19)
- Re: Operating Systems Security, "Microsoft Security, baby steps" Ben Laurie (Mar 22)
- When do exploits get used? Paul Schmehl (Mar 22)
- Re: When do exploits get used? Luke Scharf (Mar 22)
- Re: When do exploits get used? Jay Beale (Mar 22)
- Re: When do exploits get used? Luke Scharf (Mar 22)
- RE: When do exploits get used? Bill Royds (Mar 22)
- Message not available
- RE: When do exploits get used? Michael Cecil (Mar 22)
- Re: When do exploits get used? Luke Norman (Mar 24)
- RE: Operating Systems Security, "Microsoft Security, baby steps" Todd Burroughs (Mar 18)
- RE: Operating Systems Security, "Microsoft Security, baby steps" Schmehl, Paul L (Mar 18)
- Re: When do exploits get used? Jay Beale (Mar 23)
- Re: When do exploits get used? Luke Scharf (Mar 22)
- Re: When do exploits get used? Dave Aitel (Mar 22)