Code Redux 472
I don't understand why Symantec classifies a "remote root" exploit as only "medium" damage. Code Red [?] is hitting cable modem networks especially hard, as the new variants scan "nearby" IP's in preference to random ones, which has apparently caused enough damage and network congestion that AT&T's residential broadband division (MediaOne) has cut off port 80 across their network to try and halt the spread of the worm, or so several submitters reported. Newsforge has a story about various reactions to the worm, and reader nettdata sent in an interesting story about the worm becoming the main course at a dinner of security specialists.
AT&T @Home Not Cut Off in Palatine, IL (Score:3, Interesting)
AT&T @Home hasn't cut off port 80 where I live yet (Palatine IL, the NW Chicago 'burbs). A quick grep of my Apache logs shows that I got hit 499 times yesterday with requests for 'default.ida'. Just over 1200 times since this thing broke started.
What really annoys me is that I just inherited responsibility for maintaining code for a print server product we sell. Code Red is knocking these things off the net left and right (buffer overflow processing the URL, I suspect) and customers are screaming. Oh, and did I mention that since inheriting the code I haven't even been able to get the fscking debugger to run yet!?
Why anyone would leave a printer sitting wide open on the wild net is beyond me, but apparently it's not acceptable to just tell the customers to put it behind a firewall where it belongs...
Cable networks (Score:2)
this thing is fascinating (Score:2, Interesting)
Re:this thing is fascinating (Score:2)
I am apparently lucky as I have yet to see too too much traffic yet I feel it has only begun...
Re:this thing is fascinating (Score:2)
Here's my hit graph:
Aug 1: 17 hits (to default.ida)
Aug 2: 37 hits
Aug 3: 31 hits
Aug 4: 305 hits (boom!)
Aug 5: 474 hits
Aug 6: 501 hits
Aug 7: 256 hits (so far at 16:00)
At least the trend seems to be a little down today. :)
Re:this thing is fascinating - Over 100K attacks.. (Score:2)
Chris
In Poland too! (Score:3, Funny)
Re:In Poland too! (Score:3, Funny)
Kidding, kidding!
Code Red Self Test (Score:5, Interesting)
I don't know if it works, I don't have a Win boxen to test it on...
What it does (Score:2, Informative)
- 216.201.108.18 - - [08/Aug/2001:19:29:45 +1200] "GET
- 216.201.108.18 - - [08/Aug/2001:19:29:46 +1200] "GET / HTTP/1.0" 200 1948 "-"
"-"
210.zz.zz.zz 216.201.108.18 - - [08/Aug/2001:19:29:46 +1200] "GET
- 216.201.108.18 - - [08/Aug/2001:19:29:48 +1200] "GET / HTTP/1.0" 200 1948 "-"
"-"
(I've snipped by IP BTW.)
It looks like it is testing for:
* Code Red 3 backdoor (found on all good Windows 2000 systems)
* A web server
* The ida overflow
* A web server (again)
OT: pedantic correction (Score:2, Insightful)
Okay, if you're going to use the archaic, tongue-in-cheek unix-guru term "boxen," at least bother to learn that its denotation is plural.
And now back to your regularly scheduled worm discussion.
Re:OT: pedantic correction (Score:2)
I was typing too fast and my "any Win boxen" became "a Win boxen"...
Re:Code Red Self Test (Score:2)
Re:Code Red Self Test (Score:2, Informative)
It isnt difficult to self test. Get your IP with winipcfg then type this in a browser:
http:///scripts/root.exe?/c+dir
if you download a directory listing, you're infected. Ohohoho. Practically all win2k users i know are infected. how amusing.
You may also find
Weevil.
Re:Code Red Self Test (Score:2)
Re:Code Red Self Test (Score:2, Funny)
http://127.0.0.1/scripts/root.exe?/c+dir [127.0.0.1]
Re:Code Red Self Test (Score:3, Funny)
Better yet, why not just run the patch installer for them?
White Hatting Code Red (Score:2)
All well and good, I guess. But what of the day when people don't see your white hatting as such? Then someone will come out with a variant of your white hat hack on Code Red and, instead of having it hit the patch, will have it install something really nasty on the box, making it look like they're white hatting.
Yes, this could be done now--infect a box, then have it hit a second virus that slams the box after the DDoS is done--but it would be more elegant after someone started to white hat Code Red.
Cutting off port 80? (Score:2)
AT&T's residential broadband division (MediaOne) has cut off port 80 across their network
Seeing as how HTTP runs on port 80, how are outgoing HTTP connections (i.e. web page pulls) supposed to proceed across the network? Given that frontends to mail [hotmail.com], newsgroups [google.com], and file transfers are increasingly HTTP-based, they might as well just schedule total network downtime during Code Red attacks.
Re:Cutting off port 80? (Score:5, Informative)
Re:Cutting off port 80? (Score:2, Funny)
Cutting off port 80 (Score:5, Interesting)
What they should do is scan for people running IIS webservers and cut them off. Leave the Apache users alone!
Verizon closes port 80 indefinatly (Score:2)
I know i'll be switching. I don't pay 80 bucks a month to just surf the net on verizons terms. I do use my DSL for work, VPN, testing websites and personal pages.
Is there anything "We" can do. The terms of service specifically state it is up to the END user to do all necesseary functions to protect HIS data. Verizon makes no gurantees of service so how can they modify the service?
I wish i could get a class action for something.. they're limiting email to verizon.net emails only, filtering access.. what next?
Re:Cutting off port 80 (Score:2)
Re:Cutting off port 80 (Score:2)
In fact, I just wiped my webserver and I'm doing a major upgrade on it right now.
Re:Cutting off port 80 (Score:5, Informative)
From: http://help.broadband.att.com/subagreelease.jsp [att.com]
(b) FTP/HTTP Service Setup. Customer should be aware that when using the Service to access the Internet or any other online network or service, there are certain applications, such as FTP (File Transfer Protocol) server or HTTP (Hyper Text Transfer Protocol) server, which may be used to allow other Service users and Internet users to gain access to Customer's computer. If Customer chooses to run such applications, Customer should take the appropriate security measures. Neither AT&T nor @Home Network shall have any liability whatsoever for any claims, losses, actions, damages, suits or proceedings resulting from, arising out of or otherwise relating to the use of such applications by Customer, including without limitation, damages resulting from others accessing Customer's computer.
And the actual AUP page doesn't mention it at all: http://help.broadband.att.com/faq.jsp?content_id=7 2&category_id=34 [att.com]
Re:Cutting off port 80 (Score:2)
Front page: click on "site map"
Site map: click on "Policies"
Policies: click on "What is the AT&T@Home Cable Internet Service Subscriber Agreement?"
What is the AT&T@Home Cable Internet Service Subscriber Agreement?: click on "Leased Modem Subscriber Agreement"
It's right there in 9(b)
It _is_ quite benign. (Score:3, Interesting)
Besides the load of the spread (which is probably made signficantly better by having the worm mostly scanning on it's own subnet) CodeRed2 is quite benign.
Yes, it does open a remote root exploit, but the servers that got infected were already wide open due to the default.ida hole. Sure, it's easier now, but since there are simple exploits for default.ida already, any script-kiddie worth the name could already have walked straight into these computers.
In truth, I figure that the people who have made most use of this exploit has been geeks who would ordinarily never break into systems, but have been made curious about where the worms are coming from (of course, _I_ would never do such a thing... really...)
Re:It _is_ quite benign. (Score:2, Insightful)
It is only Medium DAMAGE! (Score:2, Insightful)
I don't understand why Symantec classifies a "remote root" exploit as only "medium" damage.
Maybe because they don't! You are thinking in terms of security hole. With a virus it is different, you are more concerned about data loss.
A virus can inflict low damage, ie: print a message on the screen that you are stupid, or a high DAMAGE rate of deleting your whole hard drive. Medium is a good measurement of this one, as it only has the POTENTIAL for data loss.
Re:It is only Medium DAMAGE! (Score:2)
I agree. <imo>Anti-virus software companies are in the business of protecting against viruses; of preventing a large number of users from being compromised by the same code. They are not interested in the kind of security that would prevent script kiddies or social engineers from gaining access to your computer, and so they rate viruses by the amount of damage they cause, rather than rating security holes by the amount of damage they allow. I suppose they do this to be consistent with their stance that "the viruses are the enemy".</imo>
By the way, did anyone else think it was strange that CERT [cert.org] listed anti-virus software companies, and only anti-virus software companies, in the "vendor information" section of their advisory [cert.org] about SirCam? They could have easily targeted
Re:It is only Medium DAMAGE! (Score:2)
Road runner's "warning" (Score:3, Informative)
------
VIRUS ALERT. YOUR IMMEDIATE ACTION IS REQUIRED.
Dear Road Runner Subscriber:
Road Runner, like many other ISPs and indeed the entire Internet, has today experienced an attack on its network which is apparently attributeable to the Code Red virus. It is possible that this virus has infected the PC's of Road Runner's subscribers using the Microsoft Windows NT or Microsoft Windows 2000 operating systems. Infected PC's may continue to flood the Internet and Road Runner's network with virus generated messages (even without your being aware of it).
Road Runner is working to alert all of its subscribers to this problem and to instruct them on where to find and install the patch necessary to eliminate the virus. In the meantime, Road Runner subscribers may experience slow network response, flashing connectivity lights on the cable modem, and other symptoms (such as unusual port scan log activity or increased firewall activity) while Road Runner and the Internet community work to control the impact of this virus.
IF YOUR PC IS RUNNING WINDOWS 2000 OR WINDOWS NT, PLEASE IMMEDIATELY DOWNLOAD THE CODE RED PATCH FROM MICROSOFT'S WEBSITE (www.microsoft.com/security) AND RESTART YOUR PC.
IF YOUR PC IS RUNNING WINDOWS 98, WINDOWS 95, OR WINDOWS ME, OR IF YOUR ARE A MACINTOSH USER, NO ACTION IS REQUIRED ON YOUR PART.
We ask for your patience while Road Runner continues to work with the Internet community to address this virus. Thank you. Road Runner Security
P.S. Please, do not reply to this message
--------
Well, gee, if the whole "internet community" is at work at resolving the issue, I can rest easy. But then again, they only say no to worry if you're running Windows 95, 98, ME or MacOS. Well, I'm running Linux and NetBSD, so I guess I should be worried, eh?
Re:Road runner's "warning" (Score:3, Funny)
No, you should report them to "abuse@timewarner.com" for sending you Unsolicted Bulk Email advertising those products.
Cutting Off Port 80? (Score:2, Informative)
Re:Cutting Off Port 80? (Score:2)
Against the DMCA? (Score:2, Funny)
"The group gathered around the dinner table then managed to get a copy of the worm and began disassembling its code"
Doesn't looking at the code and trying to figure a way around the usage of this program violate the DMCA? I think that those at this conference should be held accountable.
Re:Against the DMCA? (Score:2)
Cable Modem Providers (Score:2, Funny)
@Home not blocking port 80 yet (Score:3, Informative)
Re:@Home not blocking port 80 yet (Score:2, Informative)
Re:@Home not blocking port 80 yet (Score:2)
@Home started scanning port 80 last night (Score:3, Interesting)
24.0.0.203 - - [07/Aug/2001:02:19:23 -0400] "HEAD" 400 - "-" "-"
24.0.0.203 is authorized-scan1.security.home.net, the machine which has been scanning for NNTP servers on port 119, ever since @Home got threatened with the Usenet death penalty.
This is the first time @Home has ever scanned my web server. It seems odd that they're sending an invalid request, although this can distinguish between Apache and IIS. Apache will treat this as HTTP/0.9 and will not send back an HTTP header on it's error page, while IIS sends an error page with full headers.
@Home has never blocked ANY port in my area, including 137-139 (I'm on Cogeco@Home). I've connecting to my home computer from university over those ports, and sucessfully transferred files. The modems are capable of simple firewalling, as any DOCSIS modem should be (I've connected to my modem through SNMP and set up some firewall rules, to block connections on port 1214 - my brother was hogging all my upstream bandwidth by using Morpheus/Kazaa).
I'm still gettings tons of hits from Code Red, but I don't really mind. I find it interesting to look through my logs and see the different versions of the worm. Among hundreds of Code Red hits, I have 3 interesting ones. Instead of saying "GET /default.ida?XXXXXX"..., they are just "XXXXXX"..., with the exploit code on the end. Does anyone know what this is? The first hit was around 12:30am last night.
Re:@Home not blocking port 80 yet (Score:2)
Thanks to Linus, Alan and all the others who made my firewall possible.
There seems to be a newer variant (Score:2, Informative)
Re:There seems to be a newer variant (Score:2)
Not that it matters.
Re:There seems to be a newer variant (Score:2, Informative)
See http://www.securityfocus.com/bid/1806 [securityfocus.com] for details.
I am getting about one attempt every hour using variants on that exploit - all from address blocks in mainland China.
My 'Data' Light has been going steady since Friday (Score:3, Funny)
really, do these home users PAY for IIS? of course not, would you? If you're going to use software free, use free software!!!
I can't imagine that anyone who administers servers for a living hasn't already patched againts this. Thus I think most of this Code Red comes from home users windows boxes with pirated software. I wish MS did pursure those people because we'd have a whole lot more Linux users if that was the case. ( I guess that's why they don't)
a note to IIS users:
Re:My 'Data' Light has been going steady since Fri (Score:2)
RoadRunner Fairfax VA unusable (Score:4, Interesting)
The phone system reports that SirCam has taken out their email servers, and that Code Red [I|II] is causing serious performance problems. They expect to have it done by tomorrow - except that today, when I called, they no longer are saying that, merely begging users to patch their systems.
Phone tech support is turned off, at least in my wanderings in the phone system.
Anyone else having these problems?
@Home (Score:2)
I know it's more than port 80 hits, because there's not a constant stream of them in my log file, and I don't even run the web server most of the time. I get plenty of them when it does run, but it's got to be more than that.
Re:@Home (Score:2, Informative)
probes for non-existant IP addresses.
tcpdump -i eth0 -n
(or whatever your external ethernet interface is).
I was seeing 2000/minute ARP requests on Monday,
don't know what it is now...
Crikey (Score:3, Interesting)
So even with the patch up and available, the problem is far from solved. I bet the number of zombie machines out there surged 10fold today, many of which are on high speed corporate bandwidth, instead of the more meager cable modems with severely crippled upstream access.
It's going to be a rough year.
You misunderstand the danger (Score:3, Insightful)
I reiterate, the only safe path is to install on an airgapped machine, or on a well secured LAN. But if you have to download it from the internet, there is a chance that *anything*, not just CodeRed, will be hiding somewhere by the time you patch.
Re:You misunderstand the danger (Score:2)
Re:You misunderstand the danger (Score:2)
You've dissambled THIS worm, but every copy of Win2K ships with the IIS vulnerability, so plenty of new worms could be created that do other things.
Point 2 is exactly my point, the patch is not going to fix the secondary damage caused by the worm in the short time it takes you to destroy it.
The only real fix for something that can be exploited so quickly would be to issue new copies of win 2K to everyone with this hole patched, but that's not going to happen. So this hole will exist for however long it takes MS to release the Win2k replacement.
With Linux, on the other hand, new versions come out several times per year, which means the baseline installation for a majority of the users is generally only a few months out of date.
And "airgap" is not mine, it's been around for quite some time in the security community. It's become a bit outdated with the advent of wireless technology however.
Re:Crikey (Score:2)
step 1.5: Code Red III installs itself (just after install and before you can even apply a patch)
step 2: apply patch
step 2.5: Code Red III reverses patch
step 3: reboot (preexisting worms disapear, server still vulnerable)
step 4: Code Red III installs itself...
Alternate step 1.5: Remote user gets pinged from your machine by Code Red and decudes to run a format c:/ before you can patch the box.
sure, yea, but (Score:2)
No patch for Alpha NT 4 machines (Score:2)
Port 80 blocking on AT&T (aka Mediaone segment) (Score:2)
Wow, that's kind of weird considering the traffic ended at EXACTLY 9AM for old pages I used to host on that server. And wow, someone couldn't get to my resume that day, and emailed me about the problem they had. Very odd. I don't have a problem if they are going to block it for whatever [att.com] reason [att.com], but at least admit it in the Agreement [att.com]. I just want it for personal use...
Twenty-four hours. (Score:5, Insightful)
grep ida access_log | cut -d" " -f1 | sort | uniq | wc -l
139
Looking over the infected hosts, it seems that half are broadband clients (RR, Bellsouth, Verizon, @Home, etc.), a third are overseas (with
I see Code Red as a big boon to jobhunters, especially those looking for SA work. Right there in your logs is a list of companies that are hiring, whether they know it or not.
I guess the big question is this: do you root their box before the first interview or after?
k.
Re:Twenty-four hours. (Score:2)
It is "medium" because hysteria won't help us (Score:4, Insightful)
The kind editor should also remember his math and Netcraft nice figures. IIS installations represent some 25% of the servers out there. Most of those are already patched by now. Even when they were not patched Code Red got only 6-7% of them (considering 4 million servers/250 thounsand infected).
Code Red is certainly a local problem in networks where it finds a nice ecologival niche. Cable modem networks are likey to suffer due to their archtecture and their own flaws. Other networks will suffer down the road.
But the main point is that this particular the worm is out of the way for nmost of us (if it ever was in the way) and will only affect the bandwidth locally.
It is almost time to reduce its risk rating to low.
Code red growth spurts (Score:5, Insightful)
One possible saving grace is that most of our students come back after the worm is supposed to sleep (20th of the month). However, it might wake again come Sept. 1st. Not to mention any server out there with bad dates ready to spew it around.
On another note, I've notified several people in other departments that they've been hit with the CR II version. They say "well, I'll just apply the patch". Wrong, that will stop your computer from trying to broadcast the worm. Unfortunately, the patch doesn't clean up the trojan explorer.exe and registry settings. I tell them "you'll need to reformat the whole computer, and they laugh". Well, at least I can be first in line to berate their IT department for not taking that suggestion when their whole networked gets compromised from another backdoor installed during the computers 'open' state.
-A non-productive mind is with absolutely zero balance.
- AC
Re:Code red growth spurts (Score:2)
This may be insightful, but how many of these people will ACTUALLY be running a vulnerable web server? Only those that have installed IIS with Windows 2000! I am willing to bet that this number is negligable among college students, especially those with new computers. Those computers will most likely be running ME, which is less expensive and is more suitable for home/student use.
Those students running Win9x or ME are NOT VULNERABLE from Code Red or CR II and those running NT4 are NOT VULNERABLE from Code Read II. This kind of FUD is what makes people panic. We don't need it in the news and we especially don't need it on Slashdot.
Win2K a bit more common than one would think. (Score:2)
Additionally, since alot of the colleges in Ohio have site license deals with Microsoft so that students can get the OS for cheap (or even free), there were just enough people figuring that 2000 must be better than 95, simply due to the numbers, to cause us a bit of aggravation.
Of course, out of those people, most probably don't have IIS installed, but I've come across just enough people who install random things they don't need to say that the problem, while small, certainly isn't insignificant.
Why Symantec says that Code Red is medium. (Score:2, Troll)
It is well known that Microsoft could easily crush Symantec. Almost all of Symantec's products fill holes in the Windows Family Line that do not exist in other operating systems. According to reports that I have read, the Windows XP betas have, firewall software, remote access software, older operating systems have also hurt the viablity of Symantec products.
It is clearly in Symantec's best interest to ensure that Microsoft does not add to many of these new features, and when it does to water them down or license Symantec technology. It would be very easy for microsoft to include a powerfull firewall system based on one of the BSD firewall systems. But instead they have included a weak fire wall that most security consciuos users would find lacking. Microsoft Scan Disk and Defrag are also both examples of code that have been watered down. The code for defrag is even licensed from symantec.
In the past, companies that have made Microsoft look bad have been crushed. Symantec does not want to suffer the same fate
Re:Why Symantec says that Code Red is medium. (Score:2)
Re:Why Symantec says that Code Red is medium. (Score:2)
Give me a break.
Go search google yourselft!
The Morris worm hit less then 6000 computers
for a period of time, Code Red was infecting that many computes every three minutes.
As of July 19th, 359,000 computers were infected
http://www.cs.berkeley.edu/~srhea/morris-intern
http://www.caida.org/analysis/security/code-red
Microsoft is worse than unix for the following reasons.
1) it is a monoculture, one web server runing on one operating system, runing on one CPU type. Compare to *nix which has about three popular webservers runing on about 20 OS's runing on about 10 CPU types. For the OS's and webservers, there are hundreds of different builds. This makes building a worm with good penetration very difficult.
2.) Most windows admins no almost nothing about there systems. Nuf said.
This is getting boring and long winded. I have better things to do than explain why windows has such poor security.
The real danger (Score:5, Interesting)
Remote Linux install, anyone?
My stats (Score:2)
My thanks, once again, to the author of the wonderful Perl program which generated this (link available on site).
Hmm, evil or DDoS in the making (Score:5, Funny)
cd
ln -s
I'm only a 128k ISDN, but with compression, I can push over a T1 worth of zeros
Only takes 12868 bytes (Score:2, Informative)
Code Red will only slurp down 12868 bytes.
Don't do it - the 'net has enough stress on it with 5.9 million IIS running hosts [netcraft.com] trying to infect everything in site without you transmitting a bunch of zeroes.
Yes, so I had similiar thoughts, but Daniel Lawson taught me better [linux.net.nz]. (Thanks Daniel BTW.)
Re:check out the above link... (Score:2)
1595 *unique* hits on my road-runner-hosted box (Score:2)
1595
Amazingly annoying (Score:4, Informative)
The bandwidth it used was so bad that it completely wiped out our ability to get out via HTTP. We could ping, get and send mail, but we couldn't browse at all. I had innoculated my home machine, and it wasn't until this morning, when we received a notice from our ISP accusing of massive port scanning of port 80 that I made the connection. I went around the office and, even after 5 of the 6 machines were innoculated, we still couldn't get out via HTTP. It wasn't until the 6th was innoculated that we could get out.
Our line is a 768/512 DSL (I believe those are the numbers), and it amazes me that a single machine infected could cause so much trouble. This is pretty disturbing.
Jeeeeez (Score:2)
Hilariously Ironic . . . (Score:2, Interesting)
The CNN.com story about this makes no mention of AT&T's woes. Wonder Why?
It because they're one of CNN's biggest sponsors. The online video coverage of the story is even preceded by AT&T commercials :). Now THATS Irony!
Here's [cnn.com] the Video . . .
New variant is a blessing in disguise? (Score:2)
I've already seen at least one site sending out automated 'a host in your network may be infected' notices by putting up a CGI script in place of vulnerable IIS binary, and using the ARIN database to try to guess who controls the network that the attacking host resides in.
I only received the warning message because it guessed wrong :-)
Real damage done to Britain's telephone inquiries (Score:2)
(Note: calls work fine; it's just directory information that you cannot get.)
Regarding its effect on laser printers. (Score:2, Funny)
Hasn't hit any of our servers but I keep getting the w32.sircam worm in my email all day. I reply to them all with easy to comprehend AOL language... "You've got worms."
small survey (Score:5, Informative)
321- 20.1% - "Under Construction" default blank page
0- 00.0% - "too busy"
1093- 69.4% - cannot connect
183- 11.4% - some web page
Re:small survey (Score:2)
How did you automate that? My shell kung fu is weak.
Or do you just have a lot of time for copy/paste?
FWIW I manually did about 40 IPs the other day. Similar ratio.
Re:mediaone EUA ALLOWS FTP AND HTTP SERVERS (Score:2)
I wonder how far it can be pushed? My server on @Home dishes out almost 3,000 pageviews per day. (!) I'm starting to get worried. I need a backup plan in case they pull the plug on me.
Man, I wish... (Score:5, Insightful)
I really think that it's the responsibility of a machine's owner to lock down his/her system from attack. Ignorance of the rule is no excuse. If you put a machine on the net, and it's not secure, it becomes a danger for everyone.
The easiest thing to do is to shut down the access to machines that are infected. That way, you have their undivided attention when they call you up and say, "My cable's not working!" You simply respond... "Yes, we shut it off, because you wouldn't take care of business."
You're not lame for running IIS if you've patched it. You're lame if you aren't paying attention to the patches out there.
Re:Man, I wish... (Score:5, Funny)
Sorry for being such a troll, but what makes you believe that this patch is the ultimate cure of IIS security bugs? You may not be lame, but you do posess an impressive threshold for pain.
Re:Man, I wish... (Score:2)
Re:Man, I wish... (Score:2)
Well, we all have our off days...
but what makes you believe that this patch is the ultimate cure of IIS security bugs?
What makes you believe that this webserver is the ultimate cause of computer security bugs?
Currently my own computer system is accepting untrusted input through (to name a few) openssh, samba, XFree86, pine, mozilla, and identd. I can recall installing security updates at least once over the past four years for all but the last two programs, and I may have forgotten a security update (or thought of it as a functionality update) for them.
I'm sure you're happily using Apache and Sendmail; check your logs sometime. You see those 90% of users running IE and Outlook? Wanna guess how many of them are patched against the dozen remote root exploits that have been found in those client-side programs?
Running a patched IIS may not be the epitome of anti-lameness, but it's far enough above the median internet shmoe that you might as well be friendly to the guy.
Cutting off Port 25! (Score:2)
If @home blocks my port 80 i'll be quite pissed.
My ISP (www.dsl.ca) specifically allows you to run servers - and even rents a static IP. Then, one day recently, they surprised me by firewalling all outgoing SMTP. Of course, this coincided with a BIND change on my nameserver, and so when my mail spool started to fill up, my first assumption was that I'd killed the reverse lookup! I spent an hour or so trying to figure out how I'd gone wrong, but I didn't think I did. Finally, I contacted 'em about it. They just shut it off because there were too many spammers and they didn't want to do a mass-mailing, which would become a tech support nightmare ("uhh... this port 25 thing, do I need it?").
Anyway, I'm started to get really annoyed by Code Red II. My webserver log file [glowingplate.com] is full of IIS crap. I hold Microsoft responsible for marketing a faulty product.
Yes I'm lame, I'm running IIS (patched) on my cable modem.You are lame, for sure. You know, it's really not that much work to set up an old 486 or something with FreeBSD and NAT, add Apache from the ports collection, and laugh at all the IIS lusers. Please ditch IIS; I'll provide a helping hand if I can.
Re:Medium damage (Score:5, Insightful)
Well, given the choice between having j00r box r00ted and having something like WinCIH blank out your BIOS and wipe out your FAT...
For security, it's critical. But the amount of data loss is minimal until after someone telnets to the open port and blows away your drive.
Finally, consider Symantec's core market -- not the guy running a brokerage firm on a farm of IIS boxen, but home and office users of PCs worried about the virus that'll wipe out their pr0n collection. Joe Win95er really isn't at risk from Code Red II, apart from wondering why "the Internet is slow" if he's on RoadRunner.
Considering Symantec's core audience, and what this worm could be doing to compromised systems, and yeah, I'll buy "medium".
Re:Medium damage (Score:2)
I'd just hope they'll have more imagination with their hacks. "Hacked by chinese" WTF? Spending all that time devising a crufty virus, and that's all they have to say? What a complete waist of human effort. Blackhats wearing diapers?
Re:"Medium" Damage (Score:2)
Oh, come on. You say that it doesn't erase your entire harddrive. Rather, it tells the entire net "Hey everyone! I am an infected computer, you can run any command you want on me!".
For example, my web log (and everyone else's web log) has the hostnames or IP addresses of dozens of infected systems. It would be a trivial matter for me (or anyone else) to now erase the hard drives of any of these machines, or just to browse through the entire hard drive and take what I want and trash the rest.
Or even better: use the back door to install a new Trojan that will still be present even after the owner applies Microsoft's patch.
Re:BIG NEWS: (Score:2, Insightful)
Re:BIG NEWS: (Score:2)
Re:BIG NEWS: (Score:2)
Look at Ebola: it can spread like crazy trough the air and it kills its host in less that a week. In this case, the only solution is contention.
Let's bet: how much time do we have left until we have to create compounds around "infected" portions of the Internet...
Re:Damage rating (Score:2)
Then Symantec's done lost their minds. Remote root/shell access is the worst thing that can happen, because after that you're basically at the mercy of the cracker until you've sanitized the machine again. Complete destruction of the disks is nowhere near as bad as having someone who can eavesdrop on every password on your machine or steal any data he wants or alter any data he wants.
Re:It's about time... (Score:3, Insightful)
I'll bet that it gets strictly enforced from now on, killing all the fun even for people like me who run Apache on OpenBSD.
Re:Create a Good Virus? (Score:2, Insightful)
Amerist A'Toll
Re:Network traffic seems high - is this why? (Score:2, Informative)
Basically the new, "improved", Code Red is scanning close-by IP addresses, thus trying to find machines that may not even exist, or which are turned off at the moment. In this case, the @home gateway sends an ARP broadcast packet trying to find the IP address in question. This broadcast traffic causes the "activity" light to blink constantly... In my area, there is no performance degradation, though (yet).
Re:Ease of Attack (Score:2, Interesting)
root.exe?/C+echo+Do+it+>+C:\Documents+and+Setting
perhaps with a little more explaination than "Do IT".