Difference between revisions of "Summerschool Aachen 2004/Vulnerabilities"
(→Vulns: Summerschool Aachen Immunity Weakness) |
(→Vulns: Summerschool Aachen Immunity Weakness) |
||
Line 8: | Line 8: | ||
After activation symptoms include loss of temperature, tiredness and the production of snorting noises. | After activation symptoms include loss of temperature, tiredness and the production of snorting noises. | ||
− | The Virus has a limited runtime of | + | The Virus has a limited runtime of 7 days. |
− | Currently there is no known solution or workaround to the problem. To protect yourself we advise the use of sleep and vitamin c | + | Currently there is no known solution or workaround to the problem. To protect yourself we advise the use of sleep and vitamin c or to completely take down vulnerable systems until a patch is available |
This is a candidate for inclusion in the CVE list (http://cve.mitre.org), which standardizes names for security problems. | This is a candidate for inclusion in the CVE list (http://cve.mitre.org), which standardizes names for security problems. | ||
[[Category:Summerschools]] | [[Category:Summerschools]] |
Revision as of 12:13, 24 September 2004
Vulns: Summerschool Aachen Immunity Weakness
Our analyst team has learned of the existence of a flu virus. The virus is considered to be in the wild Participants of the Summerschool run a high risk of remote infection.
It is known to target tired out participants. Currently it is impossible to determine how many systems are already compromised. Infrastructure analysis suggests a maximum infection spread of 95%.
After activation symptoms include loss of temperature, tiredness and the production of snorting noises. The Virus has a limited runtime of 7 days.
Currently there is no known solution or workaround to the problem. To protect yourself we advise the use of sleep and vitamin c or to completely take down vulnerable systems until a patch is available
This is a candidate for inclusion in the CVE list (http://cve.mitre.org), which standardizes names for security problems.