[unisog] Blaster spin

Valdis.Kletnieks at vt.edu Valdis.Kletnieks at vt.edu
Fri Aug 15 22:28:36 GMT 2003


On Fri, 15 Aug 2003 15:47:12 CDT, Chris Stoermer <stoermer at unt.edu>  said:

> Microsoft could rewrite their own version of the worm to "reinfect" users as
> they hit the windowsupdate.com site.  The new worm would cleanup blaster and
> apply the patch.

This gets suggested at least forty-leven times every time a worm comes out.

The biggest problem is avoiding the liability issues if the cleanup and patch
apply fail (and remember - applying the patch for MS03-026 in the *official*
manner often fails but claims it installed).  There's also the minor fact that in
most places, it would count as unauthorized access and get you jail time.

Of course, one could counter-argue that if the owner of the computer has accepted
the infamous SP3 EULA, it would be pre-authorized and legal... ;)

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 226 bytes
Desc: not available
Url : http://www.dshield.org/pipermail/unisog/attachments/20030815/87edee56/attachment-0003.bin


More information about the unisog mailing list