Feeds

IIS worm made to packet Whitehouse.gov

As eEye Security descends into ambulance chasing

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

Just when you thought you were finally safe from cyberwar with China, some dumb bastard has to go and create the 'Code Red' worm, targeting the White House Web site with distributed packet floods, and defacing IIS servers along the way with the inane motto "Hacked by Chinese!"

The worm attacks what's now called the .ida vulnerability, an unchecked buffer in the IIS Indexing Service ISAPI filter, which, if exploited, can yield system-level access to an intruder. The vulnerability was first reported by eEye Digital Security on 18 June; an attack script was released on 21 June by a Japanese fellow called HighSpeed Junkie; and the worm first appeared on 13 July.

After compromising a victim, the worm scans for other vulnerable IIS machines to infect. The scan is random, but the randomizing seed never changes, so the same IPs will get hit again and again from subsequently infected boxes. Bad news for sleepy admins; but good news overall, as this checks the worm's spread somewhat.

It would not be surprising to find that the author's IP is one of those repeatedly contacted. This would make it a no-brainer for him or her to keep track of newly-infected systems.

One of the more curious features of the worm is that some of the infected systems (we think those using other than US English versions of Win-NT, but the eEye bulletin is confusing) will periodically send 100k to port 80 at whitehouse.gov.

Chase that ambulance

One of the more curious features of the eEye bulletin is a surprisingly defensive commentary extolling the virtues of full disclosure. We're in favor of full disclosure too; but the tone here suggests real moral insecurity:

"An example of why full disclosure is so important would be this worm itself. Chances are this worm would have not been discovered if we had not fully disclosed details about the .ida vulnerability, allowing Intrusion Detection System vendors to create signatures for the .ida buffer overflow attack."

Of course, chances are the worm would never have been created, either, but that's a separate issue.

"The first instances of anyone learning anything useful about this worm was via Intrusion Detection Systems that had signatures based on our .ida vulnerability research which would not have been there if not for full disclosure. The computer underground continues to find vulnerabilities everyday. If full disclosure goes away, then the general security community is left in the dark, and therefore so are administrators," eEye warns.

And here comes the 'thank God for us' bit:

"More and more we are seeing an increase in worms attacking the Internet. There have been about 2 or 3 worms in as many months. Worms force computer security to become a global issue. With the rise of the Internet, not only do you have to worry about securing your own systems, you must also be careful of your neighbors' systems. For instance with this worm even if you have done everything right (installed the .ida patch etc...) your network connection could still be taken down because of the amount of data flooding you from all of the 'other guys' who hadn't applied patches and were infected by this worm. It is important to not only maintain your own security but make sure that other people you come in contact with secure their sites."

It reeks of ambulance chasing. It reeks of searching for vulnerabilities, and publicizing them, to sell security products. In other words, 'please recommend eEye's SecureIIS product to everyone you know so that you'll be safe.' The idiots who haven't yet bought it are ruining the Internet for everyone else.

In any event, the relevant IIS patches are available for Win-NT and 2K, except for W2K Datacenter Server, whose users need to pester their OEMs. The hole will be bunged in Win-XP before it's released, Microsoft says. ®

Related Links

The relevant MS security bulletin
The Win-NT 4.0 patch
The Win-2K Pro and Advanced Server patch

Choosing a cloud hosting partner with confidence

More from The Register

next story
Microsoft on the Threshold of a new name for Windows next week
Rebranded OS reportedly set to be flung open by Redmond
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Business is back, baby! Hasta la VISTA, Win 8... Oh, yeah, Windows 9
Forget touchscreen millennials, Microsoft goes for mouse crowd
Apple: SO sorry for the iOS 8.0.1 UPDATE BUNGLE HORROR
Apple kills 'upgrade'. Hey, Microsoft. You sure you want to be like these guys?
ARM gives Internet of Things a piece of its mind – the Cortex-M7
32-bit core packs some DSP for VIP IoT CPU LOL
Lotus Notes inventor Ozzie invents app to talk to people on your phone
Imagine that. Startup floats with voice collab app for Win iPhone
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.