Snitz Forums 2000
Snitz Forums 2000
Home | Profile | Register | Active Topics | Members | Search | FAQ
Username:
Password:
Save Password
Forgot your Password?

 All Forums
 Announcements
 Announcements: Community
 More info about "CODE RED" ATTACK (WORM)
 New Topic  Topic Locked
 Printer Friendly
Next Page
Author Previous Topic Topic Next Topic
Page: of 2

warrior
Starting Member

Sweden
32 Posts

Posted - 30 July 2001 :  14:24:06  Show Profile
Her is more info about worm

Wormholes on your server


To determine if your IIS systems are affected, simply search your file system for anything named root.exe. If you find anything, you have most likely been compromised.

The root.exe file is simply a copy of cmd.exe, placed in a directory that is accessible to and executable by an attacker using the Unicode vulnerability. The file is generally located in the C: > Program Files > Common Files > System > msadc directory. If you find this executable, it is most likely that you have been remotely compromised. To verify that you are actually vulnerable, type this URL into a browser, using your own address:

http://Your IP/msadc/root.exe?+/c+dir

If your server is compromised, your browser will display a directory listing of the msadc directory. (Of course, virtually any command execution is possible with this script.) Note that some variations of the worm could potentially use a directory other than msadc, so note where your copy of root.exe was found.

When were you compromised?
Did you find root.exe on your IIS server? Wondering when it happened? Search your IIS logs for the strings /../../ and root.exe. These strings will be in the GET requests logged by your IIS server, as shown in this excerpt of the CERT advisory:

2001-05-06 12:20:19 10.10.10.10 - 10.20.20.20 80 GET /scripts/../../winnt/system32/cmd.exe /c+dir 200 -
2001-05-06 12:20:19 10.10.10.10 - 10.20.20.20 80 GET /scripts/../../winnt/system32/cmd.exe /c+dir+..\ 200 -
2001-05-06 12:20:19 10.10.10.10 - 10.20.20.20 80 GET /scripts/../../winnt/system32/cmd.exe /c+copy+\winnt\system32\cmd.exe+root.exe 502 -

Note the time/date stamp associated with these entries.


The worm


This worm, commonly referred to as the Sadmind/IIS worm, is unique in that it compromises both Windows and Unix (Solaris) systems. Like the distributed denial of service attacks of recent infamy, this worm uses intermediate Unix systems as robots or zombies. Each Unix robot is used to launch attacks against thousands of IIS systems as well as other Solaris systems. Each compromised Solaris system is then used to attack other systems--hence the prolific nature of the worm.

The worm exploits two common vulnerabilities that were addressed by their respective vendors months earlier. On the Solaris side, the vulnerability is in the Sadmind service. This remote procedure call service is commonly enabled on Solaris systems and is used for remote system administration tasks. Obtaining a patch from the vendor or simply disabling this seldom-used service will prevent compromise. (Disable the service by appending a # in front of the Sadmind line in the /etc/inetd.conf file.) The IIS vulnerability is the Unicode vulnerability, which we discussed in detail in the previous column.

The full CERT advisory explains the worm in more detail. Digital Offense maintains a copy of the worm that can be downloaded and examined. It is important to remember that modifications to this source code have most likely been made, and mutants of this worm could use names other than root.exe.

Remain vigilant
The primary reason that we bring this worm to your attention is to demonstrate firsthand the effects of Web server vulnerabilities. Hopefully, many of you have discovered and corrected this vulnerability in your IIS servers. Unfortunately, we are constantly surprised by the number of vulnerable systems on the Internet. We are amazed by the sometimes lackadaisical attitude of administrators, who, when faced with this compromise, simply ignore it. Awareness and understanding are the first steps toward better security.

It is important to remember that this particular worm is one of many security issues that may affect your Web server. While this worm provides a dramatic example of what can happen, keep in mind that even if you don't have a root.exe on your system, your Web server may still be vulnerable. The superfluous decode and more recent IIS vulnerabilities all provide attackers with a similar remote command execution capability. Just because they were not part of a massively propagated Internet worm does not mean they are any less severe. Did you find root.exe on your IIS server? Let us know
her is the sorce
http://builder.cnet.com/webbuilding/0-7532-8-6557183-1.html?tag=st.bl.7532.pro_h7532-8-6557183-1



Moved from Code Support: ASP by Gor

Edited by - warrior on 30 July 2001 15:25:34

gor
Retired Admin

Netherlands
5511 Posts

Posted - 30 July 2001 :  15:05:08  Show Profile  Visit gor's Homepage
Warrior,

I moved you topic here, but would you mind posting the source of this info also ?
btw, please don't cross-post, I removed the other copy of the post.

Pierre
Join a Snitz Mailinglist
Go to Top of Page

warrior
Starting Member

Sweden
32 Posts

Posted - 30 July 2001 :  15:27:34  Show Profile
quote:

Warrior,

I moved you topic here, but would you mind posting the source of this info also ?
btw, please don't cross-post, I removed the other copy of the post.

Pierre
Join a Snitz Mailinglist




I´m sorry for the cross-post
I put the info to the wrong forum

big smile



Go to Top of Page

Deleted
deleted

4116 Posts

Posted - 30 July 2001 :  15:42:56  Show Profile
Thank you for the info...

Think Pink
Go to Top of Page

Doug G
Support Moderator

USA
6493 Posts

Posted - 30 July 2001 :  20:08:13  Show Profile
quote:
This worm, commonly referred to as the Sadmind/IIS worm

This isn't the Code Red Worm.

http://www.microsoft.com/technet/treeview/default.asp?url=/technet/itsolutions/security/topics/codealrt.asp


======
Doug G
======
Go to Top of Page

Cyber Paladin
New Member

55 Posts

Posted - 01 August 2001 :  00:01:29  Show Profile  Visit Cyber Paladin's Homepage
Best place to go for info is from the source. :)

http://www.eeye.com/html/Research/Advisories/AL20010717.html

MS got their information from them. It's quite the nasty little worm. Seeing as it's the end of the month... If you didn't know you had, well then you will now. **** thing has been all over the news and then some. I can't understand why but some news broadcasts report it as a virus (or that it attacks all MS software, or it's spread through e-mail, etc...). They should really get their facts straight a worm is much different then a virus (in respect to infection and possibly function).
Go to Top of Page

gor
Retired Admin

Netherlands
5511 Posts

Posted - 01 August 2001 :  00:47:34  Show Profile  Visit gor's Homepage
quote:

I can't understand why but some news broadcasts report it as a virus (or that it attacks all MS software, or it's spread through e-mail, etc...). They should really get their facts straight a worm is much different then a virus (in respect to infection and possibly function).



Yeah, and the way the explain what it does: "the virus eats away all the files on the computer" just to make it sound like a real living thing.

It is funny btw that I needed to click trhough 3 times from Dougs link to get to the download of the patch here where it then is reffered to as:
This update resolves the "Unchecked Buffer in Index Server ISAPI Extension Could Enable Web Server Compromise" security vulnerability in Windows 2000 computers running Internet Information Service (IIS) 5.0

Not a word about it being the patch for the Code Red worm. Should have helped finding it.
A search for the words code red from the Windows 2000 homepage returns no results even though it is listed as top-story on that page with a link to the article Doug mentioned.
Why make it easy.....

Pierre
Join a Snitz Mailinglist
Go to Top of Page

Doug G
Support Moderator

USA
6493 Posts

Posted - 01 August 2001 :  03:49:13  Show Profile
quote:
Not a word about it being the patch for the Code Red worm. Should have helped finding it.

Part of the reason is that the MS patch was released some time before a 'code red' worm was ever identified.

You're right, though, you'd think a search for "code red" would return something from the MS site.


======
Doug G
======
Go to Top of Page

Deleted
deleted

4116 Posts

Posted - 01 August 2001 :  04:19:39  Show Profile
M$ has a very robust web SW which does not let any crawler get into their web sites [:))]

Think Pink
Go to Top of Page

Davio
Development Team Member

Jamaica
12217 Posts

Posted - 01 August 2001 :  05:19:21  Show Profile
They were talking about searching from the Microsoft Windows 2000 homepage, as Gor had pointed out. Not from a search engine.

- David
Go to Top of Page

Deleted
deleted

4116 Posts

Posted - 01 August 2001 :  11:20:14  Show Profile
Man, it was a joke !

Think Pink
Go to Top of Page

A A Cates
Starting Member

USA
30 Posts

Posted - 04 August 2001 :  13:17:26  Show Profile  Visit A A Cates's Homepage
As of July 17 (I think, about the 17th) MS has a Security Rollup Pack out that applies all the security patches released since SP6a.

You can get more info and the pack by reading Q299444 in MS KB. At the end of the article they have a list of the included patches and links to the KB articles that describe them.


Keep the sand dunes open for people - http://www.GlamisOnline.org
Go to Top of Page

GauravBhabu
Advanced Member

4288 Posts

Posted - 05 August 2001 :  21:01:04  Show Profile
Since yesterday i was experiencing problems with IIS. It will stop after every few minutes. I installed the security patch recommended for RED WORM. The IIS is working fine since. But I am unable to locate refernce to root.exe as mentioned above. Because I do not understand where to look. Do I need to take some extra steps.
Go to Top of Page

Deleted
deleted

4116 Posts

Posted - 05 August 2001 :  21:16:40  Show Profile
quote:

Since yesterday i was experiencing problems with IIS. It will stop after every few minutes. I installed the security patch recommended for RED WORM. The IIS is working fine since. But I am unable to locate refernce to root.exe as mentioned above. Because I do not understand where to look. Do I need to take some extra steps.



As indicated above by Doug G, the first post is not speaking of the RED WORM (thus no root.exe:). RED WORM lives only in RAM memory, thus if you restart your server everything will be fine (you did it already while applying the patches).


Think Pink
Go to Top of Page

GauravBhabu
Advanced Member

4288 Posts

Posted - 05 August 2001 :  21:32:39  Show Profile
Thanks bozden, that helps.

Share A Square at forumSquare


gauravbhabu

There is only one miracle...That is LIFE!
Go to Top of Page

Doug G
Support Moderator

USA
6493 Posts

Posted - 06 August 2001 :  00:34:28  Show Profile
Just FYI, Windows Update installs critical server patches for both W2K and NT4. I find it easier than sifting through a bunch of individual patches.

======
Doug G
======
Go to Top of Page
Page: of 2 Previous Topic Topic Next Topic  
Next Page
 New Topic  Topic Locked
 Printer Friendly
Jump To:
Snitz Forums 2000 © 2000-2021 Snitz™ Communications Go To Top Of Page
This page was generated in 0.17 seconds. Powered By: Snitz Forums 2000 Version 3.4.07