Vulnerability Development mailing list archives
[Fwd: [Fwd: ICQ 2000 trojan/worm (VD#5)]]
From: BlueBoar () THIEVCO COM (Blue Boar)
Date: Sat, 13 Nov 1999 09:38:21 -0800
"Dirro, Toralv" wrote:
FYI We added detection for it - DAT-4053 will detect it with McAfee/Dr Solomon's. Mit besten Gruessen, Toralv Dirro Virus Research Engineer Network Associates AVERT, Central Europe-----Original Message----- From: Blue Boar [mailto:BlueBoar () thievco com] Sent: Wednesday, November 10, 1999 6:25 AM To: virus_research_de () nai com; Toralv_Dirro () nai com Subject: [Fwd: ICQ 2000 trojan/worm (VD#5)] "Dirro, Toralv" wrote:Hi, I don't know if someone else from our team allreadycontacted you or if wedetect it anyway, but we are allways looking forviruses/trojanes to adddetection for, especially if they are out in the wild. Soif you could sendme that sample (or any else that you stumble across in thefuture), it wouldbe great. Best send it to virus_research_de () nai com best regards, Toralv Dirro Virus Research Engineer Network Associates AVERT, Central Europe - a division of NAI-Labs
Current thread:
- ssh-1.2.27 remote buffer overflow - exploitable Frank (Nov 08)
- Re: ssh-1.2.27 remote buffer overflow - exploitable Jochen Bauer (Nov 09)
- Re: ssh-1.2.27 remote buffer overflow - exploitable Daniel Jacobowitz (Nov 09)
- Re: ssh-1.2.27 remote buffer overflow - exploitable Markus Friedl (Nov 11)
- [Fwd: [Fwd: ICQ 2000 trojan/worm (VD#5)]] Blue Boar (Nov 13)
- Re: ssh-1.2.27 remote buffer overflow - exploitable Daniel Jacobowitz (Nov 09)
- Re: ssh-1.2.27 remote buffer overflow - exploitable -- OFF TOPIC Bill Smargiassi (Nov 09)
- thttpd 2.04 stack overflow D. J. Bernstein (Nov 09)