Mailing List ArchiveSupport open source code!
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]Massive Vulnerabilities Discovered (fwd)
- To: UUASC Mailing List <UUASC@example.com>, "Tokyo Linux Users' Group" <tlug@example.com>, "TOWLER,MICHAEL (Non-HP-Boise,ex1)" <michael_towler@example.com>
- Subject: Massive Vulnerabilities Discovered (fwd)
- From: "Scott M. Stone" <sstone@example.com>
- Date: Tue, 26 Dec 2000 13:01:45 -0800 (PST)
- Content-Type: TEXT/PLAIN; charset=US-ASCII
- Reply-To: tlug@example.com
- Resent-From: tlug@example.com
- Resent-Message-ID: <QjX4CD.A.A_C.VfQS6@example.com>
- Resent-Sender: tlug-request@example.com
warning! warning! :) -------------------------- Scott M. Stone, CCNA <sstone@example.com> UNIX Systems and Network Engineer Taos - The SysAdmin Company ---------- Forwarded message ---------- Date: Tue, 26 Dec 2000 11:38:57 -0800 (PST) From: Stefan Molnar <stefan@example.com> To: sstone@example.com Subject: Massive Vulnerabilities Discovered (fwd) ---------- Forwarded message ---------- Date: Fri, 22 Dec 2000 17:45:49 -0600 From: NetW3.COM Consulting <netw3@example.com> To: BUGTRAQ@example.com Subject: Massive Vulnerabilities Discovered > SERIOUS VULNERABILTY AFFECTS ALL VERSIONS OF UNIX AND WINDOWS > > A serious vulnerability has been found in all versions of > Unix and Windows. This problem most likely affects all > other systems as well. > > It has been found that computer systems must be physically moved > prior to installation at a computing facility. Moreover, > when these systems are transported, they are usually moved > at some point by human beings. > > Obvious insecurity Inc. has found that a serious DOS attack > can be waged on these systems when attackers stand on top of a building > high above the area where a system is being moved at the proper > time interval. > > The attackers toolkit consists of a long range flamethrower, > a large sledgehammer, and concussion grenades. If the attacker > has perfect timing, they may drop the sledgehammer/light the > flamethrower/drop the grenade onto the target system in > question, thereby creating a DOS condition. > > This scenario can be spread easily through a coordinated > attack, but this has yet to be seen in the wild. > > Vendors have been notified 1.5 minutes ago, but have so > far proven that they are incompetent by not releasing > patches or sending a reply to our email. Therfore, in > the interests of full disclosure, we are making these > shocking results public, since YOU have a right to know. > > This earth shaking, trend setting vulnerability has been > discovered by Obvious Security Inc. We hope to overwhelm > bugtraq and the other lists with our skills so we can > make more money and have more prestige in the computer > security industry. > > Remember - "Just because it's right in your face, does > not mean that it's obvious". > > Obvious Security Inc. Bulletin #2600 > > > > > =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= > | Curt R. Wilson * NetW3.COM Consulting www.netw3.com | > | Internet Security, Networking, PC tech, WWW hosting | > | Serving Southern Illinois locally and the world virtually | > | netw3@example.com 618-353-7418 | > =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= >
Home | Main Index | Thread Index
- Prev by Date: Re: PPP connection
- Next by Date: Mandrake rehabilitated
- Prev by thread: Re: PPP connection
- Next by thread: Mandrake rehabilitated
- Index(es):
Home Page Mailing List Linux and Japan TLUG Members Links