Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
On Mon, 30 Aug 1999, John Whitfield wrote: > Speaking of the Morris worm, how did it get past the binary > incompatibilities? I know it exploited a security hole in the finger > command (since plugged) to get in, but once it was in, how did it run on > disparate systems? Was it scripted? As I recall from Gene Spafford's analysis back then, the worm propagated itself as C source and then ran itself through the victim's cc compiler. -- John Abreau / Executive Director, Boston Linux & Unix Email: jabr at blu.org / URL: http://www.blu.org ICQ#28611923 / AIM abreauj ----------------------------------------------------------------------- Software Rentals: "Microsoft Office 2000 -- $500 Down, And zero-point-nine percent financing!" ----------------------------------------------------------------------- - Subcription/unsubscription/info requests: send e-mail with "subscribe", "unsubscribe", or "info" on the first line of the message body to discuss-request at blu.org (Subject line is ignored).
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |