Feeds

IIS worm made to packet Whitehouse.gov

As eEye Security descends into ambulance chasing

  • alert
  • submit to reddit

Intelligent flash storage arrays

Just when you thought you were finally safe from cyberwar with China, some dumb bastard has to go and create the 'Code Red' worm, targeting the White House Web site with distributed packet floods, and defacing IIS servers along the way with the inane motto "Hacked by Chinese!"

The worm attacks what's now called the .ida vulnerability, an unchecked buffer in the IIS Indexing Service ISAPI filter, which, if exploited, can yield system-level access to an intruder. The vulnerability was first reported by eEye Digital Security on 18 June; an attack script was released on 21 June by a Japanese fellow called HighSpeed Junkie; and the worm first appeared on 13 July.

After compromising a victim, the worm scans for other vulnerable IIS machines to infect. The scan is random, but the randomizing seed never changes, so the same IPs will get hit again and again from subsequently infected boxes. Bad news for sleepy admins; but good news overall, as this checks the worm's spread somewhat.

It would not be surprising to find that the author's IP is one of those repeatedly contacted. This would make it a no-brainer for him or her to keep track of newly-infected systems.

One of the more curious features of the worm is that some of the infected systems (we think those using other than US English versions of Win-NT, but the eEye bulletin is confusing) will periodically send 100k to port 80 at whitehouse.gov.

Chase that ambulance

One of the more curious features of the eEye bulletin is a surprisingly defensive commentary extolling the virtues of full disclosure. We're in favor of full disclosure too; but the tone here suggests real moral insecurity:

"An example of why full disclosure is so important would be this worm itself. Chances are this worm would have not been discovered if we had not fully disclosed details about the .ida vulnerability, allowing Intrusion Detection System vendors to create signatures for the .ida buffer overflow attack."

Of course, chances are the worm would never have been created, either, but that's a separate issue.

"The first instances of anyone learning anything useful about this worm was via Intrusion Detection Systems that had signatures based on our .ida vulnerability research which would not have been there if not for full disclosure. The computer underground continues to find vulnerabilities everyday. If full disclosure goes away, then the general security community is left in the dark, and therefore so are administrators," eEye warns.

And here comes the 'thank God for us' bit:

"More and more we are seeing an increase in worms attacking the Internet. There have been about 2 or 3 worms in as many months. Worms force computer security to become a global issue. With the rise of the Internet, not only do you have to worry about securing your own systems, you must also be careful of your neighbors' systems. For instance with this worm even if you have done everything right (installed the .ida patch etc...) your network connection could still be taken down because of the amount of data flooding you from all of the 'other guys' who hadn't applied patches and were infected by this worm. It is important to not only maintain your own security but make sure that other people you come in contact with secure their sites."

It reeks of ambulance chasing. It reeks of searching for vulnerabilities, and publicizing them, to sell security products. In other words, 'please recommend eEye's SecureIIS product to everyone you know so that you'll be safe.' The idiots who haven't yet bought it are ruining the Internet for everyone else.

In any event, the relevant IIS patches are available for Win-NT and 2K, except for W2K Datacenter Server, whose users need to pester their OEMs. The hole will be bunged in Win-XP before it's released, Microsoft says. ®

Related Links

The relevant MS security bulletin
The Win-NT 4.0 patch
The Win-2K Pro and Advanced Server patch

Providing a secure and efficient Helpdesk

More from The Register

next story
UNIX greybeards threaten Debian fork over systemd plan
'Veteran Unix Admins' fear desktop emphasis is betraying open source
Netscape Navigator - the browser that started it all - turns 20
It was 20 years ago today, Marc Andreeesen taught the band to play
Redmond top man Satya Nadella: 'Microsoft LOVES Linux'
Open-source 'love' fairly runneth over at cloud event
Chrome 38's new HTML tag support makes fatties FIT and SKINNIER
First browser to protect networks' bandwith using official spec
Admins! Never mind POODLE, there're NEW OpenSSL bugs to splat
Four new patches for open-source crypto libraries
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.