From: “Mark M.” <markm@voicenet.com>
To: cypherpunks@toad.com
Message Hash: 834813dfee45e510943ecc432a19a7ee4878ebea98f3c6d4ac69999216c11d70
Message ID: <Pine.LNX.3.95.960831225055.1669B-100000@gak>
Reply To: <Pine.3.89.9608311205.A15184-0100000@netcom>
UTC Datetime: 1996-09-01 04:47:42 UTC
Raw Date: Sun, 1 Sep 1996 12:47:42 +0800
From: "Mark M." <markm@voicenet.com>
Date: Sun, 1 Sep 1996 12:47:42 +0800
To: cypherpunks@toad.com
Subject: Re: WARNING vIRuS!
In-Reply-To: <Pine.3.89.9608311205.A15184-0100000@netcom>
Message-ID: <Pine.LNX.3.95.960831225055.1669B-100000@gak>
MIME-Version: 1.0
Content-Type: text/plain
On Sat, 31 Aug 1996, Paul S. Penrod wrote:
> Binary launches are the way they do it, and the way a virus spreads,
> unless you get caught up with autoexecuting Word and Excel macros.
>
> I have yet to see *any* truly data propogating viruses.
Would you count the fingerd exploit used in the Internet Worm as a data
propogating virus? If a poorly written mail program doesn't do bounds
checking, it could conceivably allow for a Good Times-like virus. However,
highly unlikely, since mail programs are too diverse and it would be very
doubtful that a brain-dead mail program would become very widespread. I would
be much more worried about other non-email programs that fail to do bounds
checking (like Netscape v1.1).
-- Mark
PGP encrypted mail prefered.
Key fingerprint = d61734f2800486ae6f79bfeb70f95348
http://www.voicenet.com/~markm/
Return to September 1996
Return to ““Paul S. Penrod” <furballs@netcom.com>”