Viruses - This is NOT a practical Joke!

Page 2 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.

LordRaiden

Banned
Dec 10, 2002
2,358
0
0
Dude, Microsoft Windows IS a virus. A very evil virus. Get linux. You'll thank yourself. Trust me.

Plus Windows XP can be owned so fast and so hard that it would spin your head for a week. This is no joke. Look at the security lists if you don't believe me.
 

DannyBoy

Diamond Member
Nov 27, 2002
8,820
2
81
www.danj.me
Because ive confused myself i wanna clear this up, 597 is 0.35%. Right.

What versions of linux you recommened then? I would like to use redhat.

What is the compatibility over a network though? One that is running as an internet server for 2 xp machines?

Thanks
Dan
 

d33pt

Diamond Member
Jan 12, 2001
5,654
1
81
have you scanned your other machiens on the network? chances are they are coming from those machines
 

sharkeeper

Lifer
Jan 13, 2001
10,886
2
0
Plus Windows XP can be owned so fast and so hard that it would spin your head for a week. This is no joke. Look at the security lists if you don't believe me.

That's funny because I get just as many emails from Red Hat Network as I do from Microsoft like this one:

RHN Errata Alert: Updated vte packages fix gnome-terminal vulnerability

Red Hat Network has determined that the following advisory is applicable to one or more of the systems you have registered:

Complete information about this errata can be found at the following location:
https://rhn.redhat.com/network/errata/errata_details.pxt?eid=1498

Security Advisory - RHSA-2003:053-10
------------------------------------------------------------------------------
Summary:
Updated vte packages fix gnome-terminal vulnerability

Updated vte packages that fix a vulnerability in gnome-terminal are available for Red Hat Linux 8.0.

Description:
VTE is an terminal emulator widget used by software such as gnome-terminal.

One feature that most terminal emulators support is the ability for the shell to set the title of the window using an escape sequence.
Certain xterm variants also provide an escape sequence for reporting the current window title. This essentially takes the current title and places it directly on the command line. This feature could be potentially exploited if an attacker can cause carefully crafted escape sequences to be displayed on a vulnerable terminal emulator used by their victim.

Since it is not possible to embed a carriage return into the window title itself, the attacker would have to convince the victim to hit enter for it to process the title as a command, although the attacker can perform a number of actions to increase the likelyhood of this happening.

VTE is vulnerable to this issue and is used as the default terminal emulator for versions of gnome-terminal shipped with Red Hat Linux 8.0.
Previous releases of Red Hat Linux do not contain a vulnerable version of gnome-terminal.

Users of gnome-terminal on Red Hat Linux 8.0 are advised to upgrade to these errata packages, which contain a patch to disable the title reporting functionality.

Red Hat would like to thank H D Moore for bringing these issues to our attention.

Please note; because this update contains a fixed shared library used by gnome-terminal, the vulnerable code will continue to be in use as long as any gnome-terminal session remains active. The easiest way to ensure that the vulnerable code is no longer in use is to log out of your window manager. Alternatively all running gnome-terminal sessions can be closed.
------------------------------------------------------------------------------

-------------
Taking Action
-------------
You may address the issues outlined in this advisory in two ways:

- select your server name by clicking on its name from the list
available at the following location, and then schedule an
errata update for it:
https://rhn.redhat.com/network/systemlist/system_list.pxt

- run the Update Agent on each affected server.


---------------------------------
Changing Notification Preferences
---------------------------------
To enable/disable your Errata Alert preferences globally please log in to RHN and navigate from "Your RHN" / "Your Account" to the "Preferences" tab.

URL: https://rhn.redhat.com/network/my_account/my_prefs.pxt

You can also enable/disable notification on a per system basis by selecting an individual system from the "Systems List". From the individual system view click the "Details" tab.


----------------
Affected Systems
----------------
According to our records, this errata may apply to one or more of the
systems that you've profiled with Red Hat Network. To see precisely which
systems are affected, please go to:
https://rhn.redhat.com/network/errata/systems_affected.pxt?eid=1498



The Red Hat Network Team

This message is being sent by Red Hat Network Alert to:
RHN user login: sharkeeper
Email address on file: <david.klepes@shuttleteam.com>

If you lost your RHN password, you can use the information above to retrieve it by email from the following address:
https://rhn.redhat.com/forgot_password.pxt

To cancel these notices, go to:
https://rhn.redhat.com/oo.pxt?uid=1747094&oid=2306196

Summary: EVERY OS has newfound vulnerabilities. Protection against these is only as good as the person keeping things up to date. Slammer proved that.

Cheers!
 

DannyBoy

Diamond Member
Nov 27, 2002
8,820
2
81
www.danj.me
Originally posted by: d33pt
have you scanned your other machiens on the network? chances are they are coming from those machines

Both the other machines have norton running 24/7 without fail, and are scanned 3 times a week.

Nothing on either.

im still puzzled!
 

DannyBoy

Diamond Member
Nov 27, 2002
8,820
2
81
www.danj.me
Originally posted by: sharkeeper
Plus Windows XP can be owned so fast and so hard that it would spin your head for a week. This is no joke. Look at the security lists if you don't believe me.

That's funny because I get just as many emails from Red Hat Network as I do from Microsoft like this one:

RHN Errata Alert: Updated vte packages fix gnome-terminal vulnerability

Red Hat Network has determined that the following advisory is applicable to one or more of the systems you have registered:

Complete information about this errata can be found at the following location:
https://rhn.redhat.com/network/errata/errata_details.pxt?eid=1498

Security Advisory - RHSA-2003:053-10
------------------------------------------------------------------------------
Summary:
Updated vte packages fix gnome-terminal vulnerability

Updated vte packages that fix a vulnerability in gnome-terminal are available for Red Hat Linux 8.0.

Description:
VTE is an terminal emulator widget used by software such as gnome-terminal.

One feature that most terminal emulators support is the ability for the shell to set the title of the window using an escape sequence.
Certain xterm variants also provide an escape sequence for reporting the current window title. This essentially takes the current title and places it directly on the command line. This feature could be potentially exploited if an attacker can cause carefully crafted escape sequences to be displayed on a vulnerable terminal emulator used by their victim.

Since it is not possible to embed a carriage return into the window title itself, the attacker would have to convince the victim to hit enter for it to process the title as a command, although the attacker can perform a number of actions to increase the likelyhood of this happening.

VTE is vulnerable to this issue and is used as the default terminal emulator for versions of gnome-terminal shipped with Red Hat Linux 8.0.
Previous releases of Red Hat Linux do not contain a vulnerable version of gnome-terminal.

Users of gnome-terminal on Red Hat Linux 8.0 are advised to upgrade to these errata packages, which contain a patch to disable the title reporting functionality.

Red Hat would like to thank H D Moore for bringing these issues to our attention.

Please note; because this update contains a fixed shared library used by gnome-terminal, the vulnerable code will continue to be in use as long as any gnome-terminal session remains active. The easiest way to ensure that the vulnerable code is no longer in use is to log out of your window manager. Alternatively all running gnome-terminal sessions can be closed.
------------------------------------------------------------------------------

-------------
Taking Action
-------------
You may address the issues outlined in this advisory in two ways:

- select your server name by clicking on its name from the list
available at the following location, and then schedule an
errata update for it:
https://rhn.redhat.com/network/systemlist/system_list.pxt

- run the Update Agent on each affected server.


---------------------------------
Changing Notification Preferences
---------------------------------
To enable/disable your Errata Alert preferences globally please log in to RHN and navigate from "Your RHN" / "Your Account" to the "Preferences" tab.

URL: https://rhn.redhat.com/network/my_account/my_prefs.pxt

You can also enable/disable notification on a per system basis by selecting an individual system from the "Systems List". From the individual system view click the "Details" tab.


----------------
Affected Systems
----------------
According to our records, this errata may apply to one or more of the
systems that you've profiled with Red Hat Network. To see precisely which
systems are affected, please go to:
https://rhn.redhat.com/network/errata/systems_affected.pxt?eid=1498



The Red Hat Network Team

This message is being sent by Red Hat Network Alert to:
RHN user login: sharkeeper
Email address on file: <david.klepes@shuttleteam.com>

If you lost your RHN password, you can use the information above to retrieve it by email from the following address:
https://rhn.redhat.com/forgot_password.pxt

To cancel these notices, go to:
https://rhn.redhat.com/oo.pxt?uid=1747094&oid=2306196

Summary: EVERY OS has newfound vulnerabilities. Protection against these is only as good as the person keeping things up to date. Slammer proved that.

Cheers!


I like you, I think that is true. I have a beta of .NET server which a friend at c-dilla labs (Cant remember what the companys called now) gave me.
Im thinking of putting that on. Im always up to date with my security fixes on my machines. I even have all the grc xpdite and unpnp patchy things going

Dan
 

Electric Amish

Elite Member
Oct 11, 1999
23,578
1
0
How can someone get that many viruses??

I've NEVER had a virus and I don't use an AV program most of the time....

amish
 

Amused

Elite Member
Apr 14, 2001
56,002
14,532
146
Originally posted by: carolinaviking
2 more files infected!! cripes! why...thats one tenth of the files on your hard drive! WOAH thats alot!

You dug up a 2 month old thread to say THIS???

 

Cenalian

Senior member
Jul 3, 2001
681
0
0
Originally posted by: Amused
Originally posted by: carolinaviking
2 more files infected!! cripes! why...thats one tenth of the files on your hard drive! WOAH thats alot!

You dug up a 2 month old thread to say THIS???


Not to mention 2 outta 20,000 isn't 1/10th of his files, its 1/1000th.

Look up, theres instructions on how to get to the calculator in windows

 

DannyBoy

Diamond Member
Nov 27, 2002
8,820
2
81
www.danj.me
theres instructions on how to get to the calculator in windows

Lol

I didnt expect to see this thread popup again!

Now that its back up (Sorta) it would be useful to ask a question.

Ive got NAV running on all my machines, and none of them get viruses, except of course my server.

Whats going on

Every day i get at least 10 popups from NAV saying an infected file has been detected, although when i do a full scan nothing is found to be infected.

Its as if they jsut appear when and where they want to. Most of the time they seem to lurke in system DIR

Any Ideas?

Thanks
dan
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |