[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [cobalt-users] RE: OpenSSL Worm in the wild....
- Subject: Re: [cobalt-users] RE: OpenSSL Worm in the wild....
- From: Gerald Waugh <gwaugh@xxxxxxxxxxxxxxxxxxxxxxx>
- Date: Sun Sep 15 17:45:01 2002
- Organization: Front Street Networks LLC
- List-id: Mailing list for users to share thoughts on Sun Cobalt products. <cobalt-users.list.cobalt.com>
On Sunday 15 September 2002 20:38, Scott F wrote:
> I just noticed in the CERT and Security Response (from
> Symantec) that this current worm only works on Intel
> based systems (I'm sure others will follow):
>
> "The worm uses a Linux shell code exploit which will
> run only on Intel systems."
>
> http://securityresponse.symantec.com/avcenter/venc/data/linux.slapper.worm.
>html
>
> I'm not sure about newer Cobalt systems -but all my
> RaQ3's have AMD chips.
Which is an Intel clone, it is Inter architecture
Sorry, that might save Qube and RaQ1/2 which are MIPS
Gerald
--
http://frontstreetnetworks.com http://raqware.com
229 Front Street, Ste C, New Haven, CT 06513-3203
Phone: 203-785-0699