Subj : Bugbear.A virus notes To : Mike Ruskai From : Mike Luther Date : Mon Oct 14 2002 09:42 am But in this case, Mike .. MR> The GUEST account has no access to any shares in OS/2 MR> unless you explicitly MR> grant it access. In other words, there's no MR> vulnerability unless you take MR> specific actions to create one. I used GUEST ... with a password. It was used for planned access, but passworded. In theory, it shouldn't have been compromiseable but somehow was. I only got two passes at this to research. The first one was complete surprise. The second one I missed just the very start of the attack with the trace, so we didn't learn exactly what the first few packets were like, It would have been nice to know exactly where the hole was. But with time so fleeting and no spare equipment to set up a 'pot', I opted to just get rid of Netbios over TCP/IP that wasn't needed on the box at that point. If you have any theory on how this might have taken place passworded, I'd like to know your thoughts. Several others spent a good period of research time looking at the packet trace and so on. Far more informed that I'll ever be at networking. They came away puzzled as well in that there appeared to be no PW crack run or whatever associated with the incidents. One other part of the puzzle might be useful. In this case the passworded GUEST account had been used prior to the attack(s). I'm not sure about what the status of the connection being active at these starting point, whether the share was actually in use or not. --> Sleep well; OS/2's still awake! ;) Mike @ 1:117/3001 --- Maximus/2 3.01 * Origin: Ziplog Public Port (1:117/3001) .