E-mail buffer overflow virus is a REAL threat!

From: Eugene Leitl (eugene@liposome.genebee.msu.su)
Date: Fri Jul 31 1998 - 10:31:52 MDT


David C. Harris writes:
> Normally messages about e-mail viruses are indeed hoaxes, but this one is
 [...]

All very well, but _every_ package is riddled with several
constructive buffer overflows exploits, so it is sufficient
_merely to go online_. Crackers, whose favourite pasttime
is to nuke Win95 lusers dialing in via PPP could execute
any code they wish on them. HOWTO tutorials to write them
are on the web.

The only way to be more or less immune is to run Linux, read
Bugtraq digest daily and apply kernel patches on a daily/weekly
basis. To be effectively immune, you need dynamic genetic
diversity (GP on application code), which probably requires
nonalgorithmic systems. Meaning, we're in for several iterations of
the digital plagues.

'gene



This archive was generated by hypermail 2.1.5 : Fri Nov 01 2002 - 14:49:24 MST