New Microsoft SQL Server Worm 290
Ian Bell writes: "A new unnamed worm has been released and, once again, Microsoft software is the target. More specifically, this new worm targets Microsoft SQL servers with no administrator passwords set. Once the server is infected, it logs onto Internet Relay Chat (IRC) servers and is ready to receive commands and act accordingly. Although this can be a fairly malicious worm, it is very unlikely to infect many servers due to the fact that majority of Microsoft SQL servers have administrator passwords."
Password (Score:2, Insightful)
Re:Password (Score:4, Insightful)
Yes, I agree with the sentiment that if you do not secure your boxen, you are an idiot. But if you don't, you do not deserve to be victimised.
If I accidentally leave my front door unlocked, do I deserve to be robbed/vandalised?
Re:Password (Score:2, Insightful)
If you are responsible for a house, you should know well enough to lock it.
Maybe the problem is that MS software often ends up in uncapable or unaware hands.
Re:Password (Score:2)
And how about the case (distressingly frequesnt) where the installation of some software other than SQL server installs SQL server with a blank admin password, or (as Visio2000 does) installs MSDE, a stripped down SQL server, with a blank password? Visio2000 is a desktop app - how is this sysadmin negligence as opposed to gross programmer stupidity?
Microsoft always a target (Score:2, Interesting)
Re:Microsoft always a target (Score:5, Insightful)
Who says you need source to fix problems? In this case, it's as simple as setting a password for th sa user. Anyway, the point is moot because this only affects SQL Server 7 and older. SQL Server 2000 makes you jump through hoops if you want to leave the sa password blank (as well, SQL auth isn't even the default. Instead, Windows domain auth is the default). Anyway, the point here is that source is absolutely not required to fix this problem. Just a small amount of brainpower, that's all.
Re:Microsoft always a target (Score:2, Funny)
Word up. The people this worm will affect are those who should know better. It's not like my gramma's running SQL Server, after all. (If she were, nobody would ever know the password. Some people's memory is quite the security device.)
Re:Microsoft always a target (Score:2)
DON'T OFFER THE FSCKING SERVICE AT ALL TO AN UNTRUSTED NET! That's a REALLY BASIC security rule.
sheesh. Even *WITH* passwords, you don't see my MySQL server hanging out there for the world to see. The world doesn't need to see it, so why would I have it hanging out there?
Re:Microsoft always a target (Score:1)
Re:Microsoft always a target (Score:1)
Re:Microsoft always a target (Score:2)
The Usual (Score:1)
Re:The Usual (Score:1)
However, Microsoft probably won't put much effort into finding whoever made the virus.
Every noticed that nobody puts that much effort into finding whoever made the latest IIS worm or Outlook virus (calling a spade a spade)? Follow the money. Without a more-or-less constant stream of IIS worms, Word Macro viruses or Outlook viruses, the "good guys", the anti-virus industry, wouldn't be able to turn a profit. That scanner that detects 8734 known viruses? No need to ever update it, if there's no new Windows viruses.
Virii that burn CDs? (Score:1)
default password == blank (Score:1)
Re:default password == blank (Score:3, Informative)
I've done contract development at quite a few places that had publicly exposed sql servers with blank sa passwords.
Re:default password == blank (Score:1)
All routers have default passwords setup, I don't see anyone complaining.
Re:default password == blank (Score:1)
Re:default password == blank (Score:3, Interesting)
Re:default password == blank (Score:2)
Re:default password == blank (Score:2)
Re:default password == blank (Score:2)
A properly designed network doesn't need this. First, all SQL servers should be subnetted into an internal address space, only routeable by other internal machines like the web server. Then your firewall has port 80 open and NAT's to your web server. Unless you compromise the web server and are able to write malicious code on it, there's no way to get to even ping the SQL server.
Re:default password == blank (Score:2)
geek sight %-) (Score:1, Funny)
"A new unmaned worm has been released"
Cool, atleast M$ cares about its pilots
Good. (Score:2, Funny)
Ooh, ooh! I know! We can call it the Dumbass Worm!
Seriously though, If you don't set up an admin password on your server, you deserve to be hacked. Mercilessly.
Hmm (Score:1)
Stupid (Score:1)
Re:Stupid (Score:2, Informative)
Re:Stupid (Score:1)
Re:Stupid....Marketing Department (Score:4, Insightful)
MS has always played to the LCD in computerdom - there are relatively few who have the wherewithall and curiosity to know exactly what they're doing with the tools Microsoft gives them. It's been the job of Marketing to educate the users the product has been sold to. When they can't handle it properly, it's then dumped on to the Support people. No wonder Microsoft foists it's support on it's vendors - saves them a bundle.
Example: Joe CFO wants the website up and running now, and gives the job to New Intern who doesn't have a clue. If New Intern can't get it running now, he blames his tools - namely MS, who hear about it from Joe CFO. So, figuring this out beforehand, Microsoft make it as easy as possible to get a SQL server running now - security be damned. New Intern has no authority to spend US$ 100 per call (or whatever it is) in order to contact someone who actually knows the scoop, and just blithely continues on. Microsoft make a sale, trap another customer, and get $ from supporting thier insecure product - as well as upgrades in order to get more security.
Critisize them as you want - but Microsoft has a good business model in getting everyone and thier puppy into what should be advanced products. Then they try to educate thier users as to why security is important. Backwards as it is, it seems to be working for them, too.
Re:Stupid....Marketing Department (Score:2)
There's another reason why sysadmins go for the password-free, no-security approach. It's easier, in the short term, yes, but there's also remote administration. Many sysadmins either (a) refuse to give out passwords to the people who actually use/run the servers, or (b) make those passwords empty so that they can control the machines from somewhere else in the organization without fear of interference from the local users. Going with route (a) is better from a security standpoint, but tends to infuriate the local users; if you leave the password empty, then as long as the local users aren't clued enough to turn it on themselves you're fine.
My bad... (Score:1)
More likely than no.. (Score:1)
Before you trash Microsoft, (Score:1)
But you should trash dumbass SQL Admins who don't set passwords!! WTF, yeah, their installer may not prompt them, but shouldnt someone who knows how to log into an NT or 2K know at least, "Hey, maybe this thing has a password too".
If they don't know that, they should take a sharp stick in the eye.
Re:Before you trash Microsoft, (Score:1)
Re:Before you trash Microsoft, (Score:1)
Right you are. In fact, I can't think of ANY microsoft worm, except those that are propagated by opening e-mail attachments, that is harmless to properly patched/administered machines.
So if someone is a worm victim, they either unthinkingly opened an attachment or didn't keep their machines up to date. Either way it was preventable. (Now there's the issue as to who's liable when trouble results from worms ... but I won't go there.)
Re:Before you trash Microsoft, (Score:2, Informative)
Actually, microsoft has created alot of reluctance amongst more experienced users to keep up to date.
Many service packs have actually broken systems in the past - making people who know what they are doing reluctant to apply a service pack until they are sure that it really works.
Also, many security updates depend on these service packs. In fact, some of microsofts own update reporting system will not see the patches until they are running on an up to date service pack.
It becomes a catch 22 - either way, you are dammed (well, you certainly would have been in the past). Maybe microsoft will not make these sort of errors again. Hmmm, did I just say that?
So, I'm not sure its totally preventable on MS software.
Re: (Score:3, Informative)
Too bad but we can't blame MS on this one.. (Score:2, Insightful)
Re:Too bad but we can't blame MS on this one.. (Score:2)
Perhaps you don't remember the Red Hat Pirhana episode? In the Linux world software with a default password is considerred shocking and outrageous. Even if it's pre 1.0 like Pirhana was.
Too Incompetent To Keep Their Job (Score:5, Insightful)
This is probably more of the same as Code Red etc (Score:2)
Re:Too Incompetent To Keep Their Job (Score:2)
Re:Too Incompetent To Keep Their Job (Score:5, Interesting)
we have 5 SQL servers that are forced to run with no password. because our critical software that uses it is hard coded to not have a password for SQL server.
I had asked the vendor 5 times within the past 3 years to change this, and then asked upper management to as the vendor.
What was I told? "It's not an important issue"
so not I get to be spanked this monday when 10 sql servers all start to try and connect to irc through the firewall.
So in response to you, I am more competent than 60% of the MS admins in my state. but when you have your hands tied by management you cant do crap but grab a mop and clean up after managements messes all the time... (examples? outlook, trying to run 700,000 users on a MS email server cluster,and brain dead morons wanting to have one super data center and pay for fat pipes to each office instead of having resources at each office. hmmm one disaster and this company is 100% screwed.)
oh and your "yardsticks" comment...
first the manager of the IS department or even the CTO should be the one getting publically fired. as they are usually the ones tying the hands of the admins and preventing them from doing their jobs.
if a shop get's hit with any exploit, fire the manager first and the techs last.
I can confirm this (Score:2)
There is a lot of stupid custom software written that needs MS SQL server with an admin account that has an empty or fixed password. I have installed this stuff before.
It's crappy stuff, but I don't pick it, and I don't think I have the business understanding to know how to pick something better that is still useful to the company.
All you can do is try to turn off remote access or firewall the thing...
Re:Too Incompetent To Keep Their Job (Score:4, Interesting)
Another poster has indicated that sometimes stupid management decisions prevent you from doing what you know is optimal. If YOU know something's stupid, but your manager tells you to do it anyway, get it in writing (or at least in email). Do NOT do anything potentially harmful to your company unless you have it in writing. Claim that it's part of your documentation procedures, that all non-vendor recommended configurations must be documented.
If your boss refuses to provide direction in writing, send a memo or email confirming your conversation and letting the boss know that you're going to do what he said. When you're done, send another one saying so, reminding the boss that the situation is nonoptimal and encouraging him to provide you with the resources or permission to optimize things again. Be sure to keep a hard copy of this communication. If your boss is a big enough weenie, you might want to keep a copy at home.
Keep in mind that a good email admin can alter emails on the server and leave no tracks, so if you're the email admin, instructions in email are irrelevant. Same is true (but for a different reason) if the email admin is in the boss's pocket.
This advice is probably not applicable to a lot of readers who are already job-hopping and don't care if they do more. Good for you. Some of us, though, (myself included), like our positions and stay in them, and therefore must learn to weather a succession of pointy-haired bungee-boss types. So far I've outlasted three in two years.
Finally, remember this:
All human endeavors are political. Those who don't think they're playing politics are merely playing politics badly.
Beware the small OEM/ISV (Score:2)
I so agree with you. But you'll find unsecured SQL Server databases exposed to the public Internet all the time. I've seen it particularly with Small Business Server (package of Microsoft Back Office products, including SQL Server). A small company buys a package deal from a local vendor--they start hosting their own web pages, using SQL Server, and never even wondering about anything like security.
There is plenty of fault to go around here: the small business bears some responsibility--they're buying a tool without providing the resources to use the tool appropriately. But there are lots of small vendors out there that fancy themselves as Microsoft OEMs and ISVs, assembling kit computers, doing the basic install with zero configuration (or security updates) and plugging the box into the client's network. This is precisely the market for Microsoft's Small Business Server--a low budget tool, and frequently completely unprotected.
And sometimes it's the client
Sometimes the client absolutely insists on shooting himself in the foot. I have a proposal outstanding to a warehousing firm--they're dragging their feet, and part of the reason is that they don't want to pay for two servers. (One is publicly accessible, the other [which has the SQL Server installed] is not.) Why can't we use the same box as the web server and the SQL Server? Well, gosh--because then anybody with SQL Enterprise Manager can connect on port 1433, and keep retrying passwords as long as he wants--the login dialog never times out.
You heard it here first: this worm will affect a lot more companies that you'd think.
More incompetent than you think (Score:2)
It's still flawed (Score:2)
Re:It's still flawed (Score:2)
MSDE too? (Score:2)
P.S. Does anyone know if there's a way to keep MSDE from listening on TCP/IP connections? There's Named Pipes, but from what I was able to tell, that only works on WinNT, and not on 9x.
Compaq Insight Manager XE (Score:1)
Re:MSDE too? (Score:2)
Server-Side Network Libraries
The following network libraries can be included: Named Pipes, TCP/IP sockets, Multi-Protocol, NWLink IPX/SPX, AppleTalk ADSP, and Banyan Vines. The Named Pipes and Banyan Vines server-side Net-Libraries cannot be installed on Windows 95 or Windows 98.
Obviously... (Score:2)
k.
Re:Obviously... (Score:2)
How much do you want to bet... (Score:1)
Seriously, hang the dork that EVER sets blank passwords. This will help clean out the gene pool. Thank you, and God Bless.
Priceless ZDNet Quote (Score:1, Troll)
I couldn't have said it better myself.
We don't need no damn passwords! (Score:1)
Hey Maybe These Admins... (Score:2)
...should switch to Linux/Apache. That way all they would have to do is remember to keep the patches current... umm... nevermind.
For starters.. (Score:2)
Re:Hey Maybe These Admins... (Score:3, Insightful)
Coincidentally, when you run the installer for MSSQL 2000, it prompts you to change the administrator password. Anyone who doesn't is an ignorant fool.
Er, correction (Score:2)
Re:Hey Maybe These Admins... (Score:2)
And in other news... (Score:4, Troll)
by THE_MESSENGER, Troll Staff Writer
HELSINKI - It has just been learned that any Linux box with an unset "root" password in vulnerable to remote compromise, says Dick Johnson, Linux hacker and security analyst. "The attack is very simple," John reports. "Pretty much all you have to do is log in. Then you have complete control of the system." This security problem is believed to be caused by a fundamental flaw in the design of the UNIX family of operating systems, which is the model for the Linux kernel, a popular Cheap Software product. Johnson elaborates: "Those UNIX guys just didn't account for administrators who are too stupid to set root passwords."
However, knowledge of this flaw fairly widespread within the Linux community. In fact, the only person known to be unaware of a password-less root account's grave implications is Timothy Gaybone, an "editor" for the popular Cheap Software news website "Slashdot.org." While Timothy is a hardcore Windows 98 user, the recent posting of an article detailing a similar security problem relating to Microsoft's SQL Server 2000 relational database product leads many analysts to believe that he is unaware of Linux's problem as well. DOJ crytoanalyst Harry Blotter guesses that Timothy's "reliance on Windows 98 is probably the root cause of his ignorance. After all, Windows 98 doesn't require login passwords."
There are no reports of websites compromised by this latest Linux vulnerability, although many industry experts suspect that, oddly enough, Slashdot.org may have been breached years ago. "Rob Malda's personal workstation has probably been cracked -- his spell-checkers have been deleted," Dick Johnson explains.
Re:And in other news... (Score:2)
Not so, not so... (Score:4, Insightful)
"Although this can be a fairly malicious worm, it is very unlikely to infect many servers due to the fact that majority of Microsoft SQL servers have administrator passwords."
Not in my experience, sadly. In most of the corporate environments I've seen MS-SQL Server installed, the sa account has had no password. You may wonder what their logic was... "nobody would know how to hack it, and it's just a development server anyhow."
Yeah, right... a development server exposed to the net. That's not the worst of it, though. I've seen shops where the sa account was kept blank so ASP "programmers" wouldn't have to bother with remembering a password. This shitty practice is amazingly common.
It's usually very difficult to reason with the management types on this sort of thing. Most of these people view the database server as a magic box where their information is kept, not as a system that needs to be properly secured. By and large, most corporate types I've talked to actually believed you'd have to have physical access to the machine. I can't say how many times I've heard them say things like "oh, that's what the Administrator logon password in NT is for, right?". Uh, no try again...
It would probably be impossible to accurately say how many people are running with open sa accounts, because to stand up and admit it would be career suicide for any "database admin". Then again, given the lack of knowlege concerning this among the management types, maybe they wouldn't take so much flack after all. In the end, they could always blame Microsoft for letting them set up the account with a blank password to begin with (dumb, but I can see them saying that).
Web hosting by geeks, for geeks. Now starting at $4/month (USD)! [trilucid.com]
If you're gonna email, use the public key!
Re:Not so, not so... (Score:3, Interesting)
In the unlikely event of an ASP programmer:
a, Giving a shit about security and
b, Realising that in all probability the IIS box will be owned at some point, and therefore his source code will become (effectively) public knowledge...
What options do these... delightful individuals... have for not having a plaintext password stored in the
For extra points, how to do it on php? Yes, I am in the process of developing something under php and am a tad concerned about this.
Dave
Re:Not so, not so... (Score:2)
Very good questions, actually
Under Perl or PHP, you can do it by storing the login info in a file that's chmod'ed to disallow access to all but your userid. Now, in this scenario, your script has to run as your userid (instead of the web server uid [Apache or Nobody]), which can be accomplished via suEXEC or a cgi wrapper. Either way, same effect. In this event, there are only a few ways someone could snag the password (running a proggy to directly interface to the memory space of your program [unlikely], get root access to the server [you'd have more to worry about in that case], or monitoring the network wire [if you were accessing the password on a remote machine via cleartext]).
I guess my point is this: there are ways to avoid the "passwords in the script" problem in most languages/systems. Of course, if the target environment is Winows 9x, you're going to have oodles of problems with access permissions, but nobody runs productions servers on 9x, right?
Web hosting by geeks, for geeks. Now starting at $4/month (USD)! [trilucid.com]
If you're gonna email, use the public key!
Re:Not so, not so... (Score:2)
Don't do either. Set a specific password for the user IIS runs as (IUSR_, and IWAM_ if you use out of process), and tell IIS to use those account details. Then duplicate the user name and password on the SQL box, and use Trusted authentication only. No passwords stored anywhere, except the SAM database
Re:Not so, not so... (Score:2)
Hmm, I haven't used Apache under NT/Win2k, but I would assume it runs as a service, yes? If so, and it runs as LocalSystem, simply create a seperate user and edit the service properties to run Apache as that user. Then duplicate, and tell ADO to use trusted.
Use the OLE DB Provider for SQL server, otherwise no trusted connections are available.
If you use connection strings (best way, DSNs involve a registry hit when read) it should look like
Provider=SQLOLEDB;Integrated Security=SSPI;Persist Security Info=False;Initial Catalog=database name;Data Source=server
Re:Not so, not so... (Score:4, Insightful)
dont let any ASp program or programmer have sa access.
if you cant write your app to use a regular SQL account then get the hell out of the business.
It is amazing how many "programmers" require administrative access to databases or resources for no reason whatsoever. give them a user account, if they forget their password, publically humiliate them by yelling "what? are you so stupid that you cant remember a password? why did they hire you if your that stupid?" This is reserved for programmers only... sales people and marketing are allowed to forget their password daily, we know they are that stupid, but a programmer has ZERO excuse.
First, if the programmer asks for admin access, laugh them out of the office. if they ask again tell them to do it at home on their own time (Unpaid). if they ask a third time start back at the top.
Re:Not so, not so... (Score:2)
Re:Yes, a login (Score:2)
Re:Not so, not so... (Score:2)
BTW: ALL of our DB accounts only allow access to the Stored Procedures for the necessary DB (different logins for each DB). There is NEVER any actual SQL in the code. This is a Good Thing(tm).
Re:Not so, not so... (Score:2)
You restrict the rights to the file. If you are very paranoid that the source code itself could somehow be displayed (I've seen it happen, when somebody re-configures the server without your knowledge, so PHP comes up as plaintext!!!), then put the passwords in a separate file, and ensure that that file (better yet, a separate directory) is not able to be displayed AT ALL by the web server (I do this on my site). Your PHP, or embedded perl, or whatever, then simply reads the database authentication info from that file.
Re:Not so, not so... (Score:2)
Symptoms of A Bigger Problem (aka Karma Begone!) (Score:2, Troll)
the executives at a client firm (I consult) over this exact issue. At
once I feel both vindicated in that this is finally a real threat, and
infuriated that I have to fight with these morons over questions that are
really this obvious.
Not to defend Microsoft, but the main reason that there is no default
password on this sort of setup is because Microsoft assumes the
following:
1. This software will be run by monkeys (monkeys in power is our business
model).
2. Monkeys can't remember a password.
3. Monkeys won't understand the need for one anyway.
This is not directly Microsoft's fault, but rather the nature of business
in general. M$ makes so much money off of this because business wants to
employ monkeys (they're cheap, you see).
Sadly, I have to crack Administrator passwords on NT, say, once every two
weeks, because someone "forgot" it.
Heck, Milnet was a playground for hackers because of default and blank
passwords for almost two decades. Same reason.
Sometimes, being a responsible, password-using, security-loving
administrator in this world is--well--depressing. When I look around at
my "peers", I see tons of dumbasses that shouldn't even have access to the
Administrator password, let alone a keyboard. I mean, I actually have
arguments with these people about even *NEEDING* passwords at all! I get
defenses like "we're too small to be hacked" or "we don't have anything
to lose if we get hacked"!
I mean, seriously, while there are some pretty cool and froody NT admins
out there, most NT installations began with some primate stuck in front of
a computer and asked to "make it go".
I think I just realized that without the M$ crutch, 75% of the so-called
IT admins wouldn't even be able to find their ass. I hear all the time
about how Windows has provided "easier tools" and "platform
standardization". What really happened is that M$ turned the complex and
exacting task of system administration into a game of "click the
button" with all of the "hard choices" (like passwords) labeled with
scary phrases like "Advanced" or "This will require more
configuration". I suddenly realize that what M$ really did is lower the
IQ requirement to become an administrator to the point that most of these
clueless jerks defend M$ because it keeps them from having to shovel
manure for a living. Really, M$ manipulated the industry by flooding it
with idiots that must be firmly locked to the Redmond teat--knowing that
they will do more than Billy G. and the Spin Squad could ever do to defend
his monopoly!
So is this situation Microsoft's fault? By design, maybe. Directly,
no. It is precisely because business *wants* to employ cheap idiots that
these bugs exist. It's just that M$ catered to that whim and developed a
horde of pundits that cling to it's ways for their own livelihood.
The worst part is that I have personally passworded probably 40 SQL
servers (most of which doubled as a public web server) for small
businesses. I've created entire password policies for hundreds of
users. It is enfuriating to me that--despite gross evidence like
this--whenever I do a security audit, I have to drag these people kicking
and screaming to use passwords, remember them, make the secure,
periodically change them and, for god's sake, don't write them down! Is
that really so much to ask?
Oh well, at least I get paid to fix it for the three clients I have that
have INSISTED that their SQL servers have no passwords. The really ironic
thing is that all three only use SQL server for an accounting package and
their administration couldn't be bothered with passwords--and now all
their accounting data is at risk. The ironic humor of this has not
escaped me.
Re:Symptoms of A Bigger Problem (aka Karma Begone! (Score:2)
administrator in this world is--well--depressing. I mean, I actually have arguments with these people about even *NEEDING* passwords at all!
Loving security is good. Loving passwords is lame. Before I get flamed, let me say that I DO belive that security is an important issue. My gripe is specifically about passwords as the main and (usually) only way to enforce that security.
Given that the standard marketing manager has at least five passwords to remember - system login, CRM system login, order system login, HR system login, pr()n site login :-) - it's a wonder that you have any security at all left. If admins really want to have an effect on security, get your organization to move away from passwords and onto smart cards or biometric validation. It's a lot easier on you and your users.
mod this guy up (Score:2)
empty or default (Score:3, Redundant)
I'd start worrying (Score:2)
Allthough its hard to look into the future I have a feeling we're on the start of something new and icky. Don't forget that a lot of websites using IIS also have a connection to some SQL server in order to store/retrieve data. This exploit may only be capable of doing harm without a SU password, don't toss it away with "blech, there's no harm in that" and forget all about it. It just might haunt us afterall.
Re:I'd start worrying (Score:2)
I think they've ALL been extremely harmless up to this point. Sure there are still tons and tons of rooted boxes out there from Code Red. But that's not the worst thing that could happen.
I don't think most people realise the destructive power a million little pcs connected to the internet can have.
Forget about fifteen year olds DoSing Yahoo and CNN for a couple days. A million computers could easily take out all the phones in DC for a couple days. That would be expensive I think.
Or instead of just deleting a couple mp3 files the viruses could do harmfull things to the computers they infect. Stuff like destroying the monitor. Then destroying the Bios. Then erasing the hard drive. That's the kind of thing I'm afraid of.
Re:I'd start worrying (Score:2)
I received my third virus email in a week from one particularly clueless git today. The dumbass keeps opening attachments willy-nilly. Well, I hope the next one screws his boot sector. He needs a clue-by-four upside the head.
If every dumb asshole out there was to lose their system, they'd *have* to learn to be more careful, wouldn't they? Or am I still giving them far too much credit?
I like this part... (Score:2)
Only the "majority", not "virtually all"? MCSE certification takes another step downwards! And it's already on the 23rd sub basement!
ttyl
Farrell
bad things happen to dumb people (Score:2)
I second the motion to name this the "dumbass worm"
Lets not forget about home users with it installed (Score:2, Insightful)
Why there are unset passwords (Score:4, Interesting)
Having had the distinct displeasure of working with MS SQL before, I think I can lend some insight into why SQL server gets installed with no sa password.
There are lots of companies out there that make custom software, or domain-specific software, and sell it for lots of money. Most of the software they make is database stuff for busineses, (so, there might be a company that specializes in a database product for food manufacturers, etc.).
These apps, if they are for NT, usually need MS SQL server. Usually, the person installing them doesn't know anything about SQL server, they just bought it for the first time along with the app. The installation instructions tell them to do a certain thing, they do it, and viola, SQL server is installed with a default or empty password. (To their credit, the versions of MS SQL I've used are very happy to install without setting a password for the administrator.) Most of these people probably don't realize that the software can be accessed over TCP/IP. After all, remote accessibility over the internet in Windows is a relatively new thing (as opposed to the UNIX world).
So yes, this is stupid, but it is not as braindead as installing redhat and stubbornly skipping the step where it asks you to choose a root password. You have to understand what SQL server is about, which is not as common as it perhaps should be, because SQL server is typically seen as an *accessory* to the real app they are installing.
sa password (Score:2)
I don't work there anymore.
Use nmap to before you buy something online. (Score:3, Interesting)
I don't know how they got the figures. But Netcraft is traditionally very even handed and reasonable.
This new virus probably won't help those figures very much.
So remember... If you buy from a web site running IIS you have a 10% chance that your credit card number is going to be sent directly to a guy who calls himself Hax0rDo0d.
I don't want to flame MS for this since customers demand that no password be installed by default. But on the other hand theres no need to go over board and buy from hax0red web sites just to be nice.
Re:first post.... (Score:1)
And if you'r dumb enough to run untrusted binaries as root
Re:first post.... (Score:1)
Re:Perhaps this will help mysql and postgresql (Score:2)
Anyone who exposes database servers to the Internet is crazy.
Re:Astounded (Score:2, Informative)
Thus saying that, with less users using that OS, the less chance of a security problem occuring due to the low usage of Macintoshes as Servers. I am certain there are a lot of undiscovered bugs in Mac OS that we're not aware of, it is only a matter or time before they're found or never found out at all.
IIRC, the last bug or exploit that I have seen involving the Mac OS was a exploit in Microsoft Internet Explorer. That is a third-party issue though.
I feel the urge to move back to Macintosh now, though. OS X looks very purdy.
Re:Astounded (Score:2)
No. Mac may have some "security through rarity", but OS X is not obscured [apple.com]. Neither are its web [apache.org] services [php.net] nor its SQL [mysql.org] implementations [postgresql.org].
So I have to ask, what are you talking about? [apple.com]MSDE doesn't listen to 1433 (Score:3, Informative)
Re:MSDE doesn't listen to 1433 (Score:2)
Sure it does... how else would you connect to it from another machine? (And yes, you can connect to it from other machines--MSDE is made for small LAN workgroups). See MSKB article Q233312 [microsoft.com] for details on the network libraries MSDE supports.
Re:MSDE doesn't listen to 1433 (Score:2)
Re:MSDE doesn't listen to 1433 (Score:3, Informative)
As for the real SQL Server, I just installed SQL Server 7.0 Developer Edition on a test Win2K Server machine--if I pick custom install, it lets me choose which network libs to install, and by default, Named Pipes is checked (and can't be unchecked), TCP/IP Sockets is checked, and Multi-Protocol is checked. I cancelled that and restarted the setup using all the default/typical settings, and after it was all done, I started the service and it was happily listening on TCP port 1433 with no password on the sa account.
So MSDE and SQL Server default to a couple of protocols; TCP/IP is one of them. You do not have to specifically tell them to listen on TCP/IP.
Re:Password prompts (Score:2)
SQL 2k does force you to click a checkbox if you want to leave sa's password blank, and SQL 7 has a nice explanation of why it's bad.
Re:Why Microsoft is being targeted (Score:3, Insightful)
The reason all these worms target Microsoft is not because they hold the majority, it's because it's like shooting fish in a barrel...