Cable Forum

Cable Forum (https://www.cableforum.uk/board/index.php)
-   Internet Discussion (https://www.cableforum.uk/board/forumdisplay.php?f=25)
-   -   Merged: W32 Blaster Virus (https://www.cableforum.uk/board/showthread.php?t=1826)

Mark W 11-08-2003 18:45

Beware!!!!
 
BEWARE there is something very nasty happening to ALOT of customers PC's at the moment!!

after booting up, they get the following message on their windows

Quote:

system shutdown. this system is shutting down ......

....this has been intitiated by nt authority/system etc etc
basically its reboting the pc, over and over again.....

the NTL gods are frantically investigating this...

ill keep ya posted

ic14 11-08-2003 18:46

God almighty!!!


What the hells going on!!

Luckly at the mo this pcs connected to adsl,

Mark W 11-08-2003 18:49

it would appear this is the cause...

http://microsoft.com/technet/treevie...n/MS03-026.asp

Richard M 11-08-2003 18:50

Isn't it the RPC vul?
Disabling this is only one small thing in securing an M$ box.

EDIT: Yes it is, checked the link. :p

Further EDIT: Why the hell have NTL put something on the service status about it?
It's NOTHING to do with them.
This will only lead to customers phoning up and complaining for lost work etc. :rolleyes:

Maggy 11-08-2003 18:52

Well finally having ME as my OS has a positive advantage!


Incog.:)

Mark W 11-08-2003 19:00

Quote:

Originally posted by Roger K


Further EDIT: Why the hell have NTL put something on the service status about it?
It's NOTHING to do with them.

ummm :erm: thats not strictly true....tho i cant elaborate any more at the mo sorry :erm:

Richard M 11-08-2003 19:02

So....this is originating from within NTL?

I've heard various stories about this all over the net though so it's not just happening to NTL customers.

fraz 11-08-2003 19:06

Quote:

Originally posted by Mark W
ummm :erm: thats not strictly true....tho i cant elaborate any more at the mo sorry :erm:
So what has it got to do with ntl ??

Inline with I would imagine just about every residential ISP out there customers are responsible for the security of their own PCs *not* the isp (its in the user policy/terms if you want to go looking) . If people cant be bothered keeping up to date with the latest updates from their OS vendors then how is that the ISPs responsibility ?? Or are you advocating that your ISP net nannies you by blocking certain protocols at the border routers ??

Mark W 11-08-2003 19:11

ummm...it seemed to happening to ntl customers only - tho that seems to have changed now...

oh, and dont call tech support about it - with 96 calls in the queue (and climbing rapidly) we are in meltdown :cry:

fraz 11-08-2003 19:14

Quote:

Originally posted by Mark W
ummm...it seemed to happening to ntl customers only - tho that seems to have changed now...

oh, and dont call tech support about it - with 96 calls in the queue (and climbing rapidly) we are in meltdown :cry:

So get an IVR stuck up and reword the server status page to reflect the fact its nothing to do with a specific ISP :D

Mark W 11-08-2003 19:19

Quote:

Originally posted by fraz
So get an IVR stuck up and reword the server status page to reflect the fact its nothing to do with a specific ISP :D
an IVR is already up....

Quote:

ntlhome customers may currently be experiencing problems with their PC arising from a possible Windows vulnerability. We are currently investigating the specifics, but customers may experience their machine rebooting over and over again. In order to prevent your machine from repeatedly rebooting please remove the power from your broadband modem.
Please call the server status line on 0800 052 4315 for further updates.

Xaccers 11-08-2003 19:24

Its also affecting Virgin dial up users (course they're on the same network)

fraz 11-08-2003 19:27

/me gives up. Its an OS vulnerability that isn't ISP/network specific . If you're running an affected OS regardless of ISP then patch your kin system!!!!!!!!!!!!!!!

Steve H 11-08-2003 19:28

Everyone should get on to Microsoft.. Say they've lost loadsa dead important stuff.. Might get some freebies, Infact im going to ring them now :p

Ramrod 11-08-2003 19:28

Quote:

Originally posted by Mark W
it would appear this is the cause...

http://microsoft.com/technet/treevie...n/MS03-026.asp

So should I install the above patch? Bearing in mind I am on a standalone home PC behind an up to date firewall.

fraz 11-08-2003 19:30

Quote:

Originally posted by Ramrod
So should I install the above patch? Bearing in mind I am on a standalone home PC behind an up to date firewall.
Wouldnt hurt to update would it although as long as your firewall is correctly configured then go crack a beer.:smokin:

Xaccers 11-08-2003 19:32

Problem is, if you're being hit, you can't stay online long enough to get the patch :D

Ramrod 11-08-2003 19:32

Quote:

Originally posted by fraz
Wouldnt hurt to update would it although as long as your firewall is correctly configured then go crack a beer.:smokin:
Already there m8:D
....btw....how do I know if I need the 32 or 64 bit win xp edition?:confused:

Xaccers 11-08-2003 19:35

Are you running a 64bit version of XP on a 64bit CPU?
Not likely :P

Mark W 11-08-2003 19:38

Quote:

Originally posted by fraz
/me gives up. Its an OS vulnerability that isn't ISP/network specific . If you're running an affected OS regardless of ISP then patch your kin system!!!!!!!!!!!!!!!
lol....well i did pass your comment on ages go...but its still there :(

Ramrod 11-08-2003 19:42

Quote:

Originally posted by Xaccers
Are you running a 64bit version of XP on a 64bit CPU?
Not likely :P

erm.....so what you are saying is I need is the 32 bit version:confused:

philip.j.fry 11-08-2003 19:43

Anybody know if there are any issues with win98 and this threat, good old MS haven't identified it in either the affected or non-affected categories though my guess would be non-affected if me isn't.

I've not seen any probs on my pc but my connection did go out for a few hours earlier :shrug:

Shaun 11-08-2003 19:57

Is it just me???
 
My web browsing is really slow tonight, I'm not running anything else in the background. Its strange 'cos downloading speed is fine, its just the WWW

Could it be my proxy misbehaving?:( :shrug:

grum1978 11-08-2003 19:59

Quote:

Originally posted by dellwear
My web browsing is really slow tonight, I'm not running anything else in the background. Its strange 'cos downloading speed is fine, its just the WWW

Could it be my proxy misbehaving?:( :shrug:

doubt it i got the same and i'm on dial up

BenH 11-08-2003 20:06

Quote:

Originally posted by Ramrod
erm.....so what you are saying is I need is the 32 bit version:confused:
There is no 64_bit version of XP, just some extended libs that allow it to be run on an Itanium or Opteron processor. Currently the only real 64_bit OS is any one of the unicies, including Linux.

Regards,

Ben

(who long ago stopped feeling smug about windows vunerabilities :)

Tricky 11-08-2003 20:12

Be very aware...
http://securityresponse.symantec.com...c.cirebot.html

Ste Riley 11-08-2003 20:25

Blueyonder have posted information on there service status saying all there packages are slow!

Xaccers 11-08-2003 20:25

Incidently, anyone got a version of XP SP1 which will install on a not so legit version of XP Pro? ;)

Stuart W 11-08-2003 20:27

Fine for me...

Bps Stortford / Cambridge area.

Tricky 11-08-2003 20:30

EDIT: SOLUTION FOUND... :D

blackthorn 11-08-2003 20:31

Terrible browsing speeds here in wirral area

Ste Riley 11-08-2003 20:34

There's an XP bug thats hit the services at the moment if you check the NTL service page.

Ive had mates complaining about this for a few hours.

My guess is its a virus doing the rounds and its hitting some big boy servers.

Shaun 11-08-2003 21:06

Quote:

Originally posted by SteRiley
There's an XP bug thats hit the services at the moment if you check the NTL service page.

Ive had mates complaining about this for a few hours.

My guess is its a virus doing the rounds and its hitting some big boy servers.

I'd have a quick wiz round the net to see if I can find any information on it but it is so painfully slow.:rolleyes:

Wonder if it'll be any better in the morning?

I despise bloody viruses.

Ste Riley 11-08-2003 21:16

NTL Have posted news that the following virus is doing the rounds and is a possible cause to tonights problems:

W32.Blaster.Worm
http://securityresponse.symantec.com...ster.worm.html

It hits your 135 port which i have recived a load of requests from tonight that my routers stopped thankfully.

Richard M 11-08-2003 21:21

http://slashdot.org/article.pl?sid=03/08/11/2048249

Shaun 11-08-2003 21:23

Quote:

Originally posted by SteRiley
It hits your 135 port which i have recived a load of requests from tonight that my routers stopped thankfully.
Really? *goes off to check firewall logs:D

homealone 11-08-2003 21:52

Quote:

Originally posted by dellwear
Really? *goes off to check firewall logs:D
did that - usual, my son hammering my firewall with his P2P - he is not sharing with me..... lol

Emperordalek 11-08-2003 21:52

Another NTL joke as it says that this worm/virus was discovered today!

The patch has been available since mid July!

Richard M 11-08-2003 21:55

http://isc.incidents.org/

BBKing 11-08-2003 22:43

NTL joke? It's a flaw in a Microsoft OS that was patched by Microsoft in July. What on earth have ntl got to do with it? Should they go round and port scan everyone's PC for vulnerabilities?

The *exploit* of the flaw is new in the last few hours, in fact a google for msblast.exe (the filename) came up as blank for me about 4 hours ago, since when ntl have put a status up for it as a large number of calls have come in apparently. We're quick off the mark IMHO.

Shaun 11-08-2003 22:48

11/08/2003 23:35:52,"Rule ""Default Block EPMAP"" stealthed
11/08/2003 23:35:06,"Rule ""Default Block EPMAP"" stealthed
11/08/2003 23:32:38,"Rule ""Default Block EPMAP"" stealthed
11/08/2003 23:31:36,"Rule ""Default Block EPMAP"" stealthed
11/08/2003 23:31:35,"Rule ""Default Block EPMAP"" stealthed
11/08/2003 23:31:07,"Rule ""Default Block EPMAP"" stealthed
11/08/2003 23:31:06,"Rule ""Default Block EPMAP"" stealthed
11/08/2003 23:30:57,"Rule ""Default Block EPMAP"" stealthed
11/08/2003 23:28:40,"Rule ""Default Block EPMAP"" stealthed
11/08/2003 23:28:27,"Rule ""Default Block EPMAP"" stealthed
11/08/2003 23:28:19,"Rule ""Default Block EPMAP"" stealthed
11/08/2003 23:26:02,"Rule ""Default Block EPMAP"" stealthed

Nortons been busy this evening!:D :D

Richard M 11-08-2003 22:51

I feel a thread merge coming on...:D

ian@huth 11-08-2003 22:59

Why do over 99% of the attacks come from NTL (including Virgin) customers?

Shaun 11-08-2003 23:01

http://www.informationweek.com/story...cleID=13000581:rolleyes:

kronas 12-08-2003 01:53

oh joy spent 4 hours at mates house trying to sort it stumbled home now and found this :rolleyes:

Agent57 12-08-2003 02:04

Virus Alert...
 
After spending a few hours trying to figure out wtf was going on with my PC shutting itself down with a reported RPC service error I figured out it is because of a fekin virus attack. This one doesn't require you to d/l anything or open any emails... it just appears by magic :shrug: (With a little help from another M$ hole)

NTL have issued an alert in their service page, but I thought it might be worth repeating it here...


ntlhome Internet Customers using Windows XP/2000/NT
ntlhome customers may currently be experiencing problems with their PC arising from a Windows vulnerability.

This looks to be related to a new internet virus/worm discovered today.

For detailed info and ways to restore service please see the following links.

The following link will direct you to a Microsoft page with instructions on how to install a patch which will restore service :-

http://www.microsoft.com/technet/tre...n/MS03-026.asp

This link contains more specific information about the worm and instructions on how to remove it :-

http://securityresponse.symantec.com...ster.worm.html

Windows XP users may also want to enable the inbuilt firewall option. Instructions on how to do so can be found at :-

http://support.microsoft.com/default...;en-us;q283673

Lord Nikon 12-08-2003 02:13

:rofl: Oops :rofl: Still, you know where to look to keep abreast of PC Problems :D

kronas 12-08-2003 02:18

Quote:

Originally posted by Lord Nikon
:rofl: Oops :rofl: Still, you know where to look to keep abreast of PC Problems :D
yep i do oh well have the task of patching there yes 2 peeps os's and getting firewall and antivirus for them

*gotta start charging for my services damn it :D

m pc has been fine been up for a few days updated defintions firewall at full strength patched xp

*is glad he is sensible at always having antivrus and firewall software looking after his pc

not any old crap either :p

Lord Nikon 12-08-2003 02:23

Hence my use of Sygate Pro and Norton Systemworks (set to update daily)

Running tests at a few places, system is Stealthed all the way through no ports open, all attacks logged, Norton keeps on top of windows errors and keeps me virus free... once a month I check at housecall from trend micro just to be certain the AV system wasn't compromised etc lol

Richard M 12-08-2003 06:32

It seems to be getting worse:
http://isc.incidents.org/port_details.html?port=135

zoombini 12-08-2003 07:28

Maybe its just best to turn the PC off and leave it off for a few days till it goes away...lol

Richard M 12-08-2003 07:35

Don't think it will, it's programmed to infect machines until June 2004. :disturbd:

Alan Waddington 12-08-2003 08:37

It's just less then a month since the hotfix for that came out. Looks like we need to keep applying those hotfixes! Thank goodness for my router (which is set up to explicitly block those ports).

Mark W 12-08-2003 10:29

well, hats off to my housemate Pritch and his homemade router - its done the biz and kept me XP safe :D

:beer: :beer:

Richard M 12-08-2003 10:32

Aaahh....I love Linux.
</smug mode>

Alan Waddington 12-08-2003 10:43

For those of you feeling complacent. Take a look at my router log :D
Code:

IP                      Port
220.108.64.50  137
66.156.224.88  137
80.5.234.145    135
80.6.26.155      135
81.212.101.126 137
80.6.24.1          135
80.6.41.100      135
80.6.38.84        135
80.6.19.116      135
80.5.171.23      135
80.6.19.188      135
210.82.112.58  57680
4.46.170.151    137
80.6.41.98        135
80.5.216.205    135
80.4.7.6            135
80.6.34.36        135
80.5.140.92      135
80.4.194.150    135
63.201.48.35    135
212.160.18.64  137
203.58.22.85    137
81.49.216.130  137
80.6.43.37        135
81.34.140.84    137

and lots more of the same.
Looks like 135 attacks have taken over from 137 attacks.

zoombini 12-08-2003 10:44

I bet all those that got a router (with NAT FW) so they can play XBL are glad too...

Richard M 12-08-2003 10:45

I still can't believe that they haven't fired some senior people in that company.
They charge like £200 for a copy of Windows and make the worst OS known to man.
I've lost count of the number of large-scale exploits M$ systems have had in the last year.

What a load of BS.

...and they complain that people hate them and that Open Source is their biggest threat...damn right it is. :afire:

homealone 12-08-2003 12:08

Quote:

Originally posted by Alan Waddington
For those of you feeling complacent. Take a look at my router log :D
Code:

IP                      Port
220.108.64.50  137
66.156.224.88  137
80.5.234.145    135
80.6.26.155      135
81.212.101.126 137
80.6.24.1          135
80.6.41.100      135
80.6.38.84        135
80.6.19.116      135
80.5.171.23      135
80.6.19.188      135
210.82.112.58  57680
4.46.170.151    137
80.6.41.98        135
80.5.216.205    135
80.4.7.6            135
80.6.34.36        135
80.5.140.92      135
80.4.194.150    135
63.201.48.35    135
212.160.18.64  137
203.58.22.85    137
81.49.216.130  137
80.6.43.37        135
81.34.140.84    137

and lots more of the same.
Looks like 135 attacks have taken over from 137 attacks.

Same here

80.4.127.211 139
80.4.195.246 135
80.4.161.49 135
80.4.165.187 135
196.44.174.222 137
80.4.127.211 139
12.148.162.155 135
213.104.180.24 135
80.4.90.141 135
64.230.150.61 137
80.4.127.211 139

- and many more

NAT doing it's job thank goodness!

philip.j.fry 12-08-2003 12:26

I have to say, I'm feeling pretty dissapointed that my router logs show no access attempts, *sniff* my pc must not be good enough :( :D

hawkmoon 12-08-2003 12:28

Quote:

Originally posted by Steve_NTL
Everyone should get on to Microsoft.. Say they've lost loadsa dead important stuff.. Might get some freebies, Infact im going to ring them now :p
Wouldn't think so - MS released a patch for this vunerability around 28th July. If people haven't patched the system then that is not MS's fault.

timewarrior2001 12-08-2003 12:57

My system is now patched.
After declaring ages ago that I wouldnt run a firewall I have recently installed one......30 mins ago
Norton internet security (got it with Mainboard) had 22 attempted hacks so far and one "default block sokets de trois v1. Trojan")
Maybe I was wrong and I should be running a firewall all the time.

hawkmoon 12-08-2003 13:02

Quote:

Originally posted by Roger K
I still can't believe that they haven't fired some senior people in that company.
They charge like £200 for a copy of Windows and make the worst OS known to man.
I've lost count of the number of large-scale exploits M$ systems have had in the last year.

What a load of BS.

...and they complain that people hate them and that Open Source is their biggest threat...damn right it is. :afire:

The main reason you tend to see more MS exploits is because hackers / script kiddies, etc target this OS more. This is because it is mainstream.

Linux has some pretty major exploits as well (don't believe the hype that it is secure, etc). After installing Mandrake and running their update utility there were at least 50Mb of security updates avail. Do a search on Google for Linux exploits - for those who are too lazt take a look here http://www.linuxsecurity.com/advisories/

Should Linux become the mainstream home user OS then the number of serious exploits / viruses / trojans will explode.

Secondly a fix for this exploit has been out for some time.

Ramrod 12-08-2003 13:41

This may be of some use to people.
....click on the buttons marked common ports, file sharing, all service ports etc........

Richard M 12-08-2003 14:27

Quote:

Originally posted by hawkmoon
The main reason you tend to see more MS exploits is because hackers / script kiddies, etc target this OS more. This is because it is mainstream.

Very true but it is also easier to "crack".
As you will know, it is much harder to compromise a Linux machine because of the different way processes are run in the environment.

DeadKenny 12-08-2003 14:57

Quote:

Originally posted by Roger K
Very true but it is also easier to "crack".
As you will know, it is much harder to compromise a Linux machine because of the different way processes are run in the environment.

All it requires is an unpatched server (web, ftp, telnet, etc), a buffer overflow and privallige elevation to root and they're in. They can cause as much damage as they want.

Don't kid yourselfs that linux is secure. It's not. Just that few people have "got it in" for linux.

I use linux, unix and windows systems, and no matter what I always look out for the latest patches. I'd be a fool to just sit there with a smug "ah, I'm okay I use linux" attitude. Of all things I concentrate very carefully on Apache patches as that's the one thing exposed to the outside world on my system.

And has everyone ensured they've got the ICMP patch for their linux based routers? Very few people know about that one and many assume a dedicated linux router/firewall is rock solid and never needs patching, yet this will open their entire network up.

DeadKenny 12-08-2003 15:20

Quote:

Originally posted by BenH
There is no 64_bit version of XP, just some extended libs that allow it to be run on an Itanium or Opteron processor. Currently the only real 64_bit OS is any one of the unicies, including Linux.

Other than...

Windows Server 2003 Enterprise 64bit edition (note that it replaces the old 'limited' edition which might be the library version you mention, see here)
Windows XP 2003 64bit edition

;)

In fact many unix systems are actually 32bit with 64bit libraries unless you explicitly install the 64bit kernels (just take a look at 64bit AIX). The 64bit kernels often cause major headaches, so most run with 32bit kernels and just run 64bit apps on the system. Not really a true 64bit OS.

XP 64bit and 2003 Server 64bit use 64bit kernels/subsystem and the Win64 API from the ground up AFAIK. 32bit apps run with WOW32 which is a subsystem to run 32bit (Win32) under 64bit (a bit like the old WOW used to run 16bit on 32bit NT, but nothing like Win9x which was 16bit DOS hacked to run 32bit on top of it and Windows on top of that ).

hawkmoon 12-08-2003 15:56

Quote:

Originally posted by DeadKenny
All it requires is an unpatched server (web, ftp, telnet, etc), a buffer overflow and privallige elevation to root and they're in. They can cause as much damage as they want.

Don't kid yourselfs that linux is secure. It's not. Just that few people have "got it in" for linux.

I use linux, unix and windows systems, and no matter what I always look out for the latest patches. I'd be a fool to just sit there with a smug "ah, I'm okay I use linux" attitude. Of all things I concentrate very carefully on Apache patches as that's the one thing exposed to the outside world on my system.

And has everyone ensured they've got the ICMP patch for their linux based routers? Very few people know about that one and many assume a dedicated linux router/firewall is rock solid and never needs patching, yet this will open their entire network up.

Yup this is the point I was trying to make. All OS's have their vunerabilities, etc.

Many Linux / Unix users have become lax because of this perceived security that Linux has gained. Site like astalavista, neworder, etc are full of exploits and vunerabilities for all OS's including Linux, Win, FreeBSD, etc.

As Linux achieves more attention for home users then I think we will start to see more virus / trojan activity as well as more vulnerability exploits, etc.

I think that the difference is that Linux is proabably more secure out-of-the-box so to speak than NT / XP is, but both can be made pretty secure with some work and the application of the constant security updates that both formats see.

BenH 12-08-2003 16:23

Quote:

Originally posted by DeadKenny
Other than...

Windows Server 2003 Enterprise 64bit edition (note that it replaces the old 'limited' edition which might be the library version you mention, see here)
Windows XP 2003 64bit edition

;)




Ahh, but has anyone been dumb enough to use it on production systems yet :-)

Quote:

In fact many unix systems are actually 32bit with 64bit libraries unless you explicitly install the 64bit kernels (just take a look at 64bit AIX). The 64bit kernels often cause major headaches, so most run with 32bit kernels and just run 64bit apps on the system. Not really a true 64bit OS.
Yes it does tend to be easier to use 32_bit kernels, however the 64_bit is there and ready to use if you want it and has been for a while. Still the greatest problem I've ever faced is explaining to people that 'Yes the computers clock is only running at 400Mhz, but that its a 64_bit sparc.


Quote:

XP 64bit and 2003 Server 64bit use 64bit kernels/subsystem and the Win64 API from the ground up AFAIK. 32bit apps run with WOW32 which is a subsystem to run 32bit (Win32) under 64bit (a bit like the old WOW used to run 16bit on 32bit NT, but nothing like Win9x which was 16bit DOS hacked to run 32bit on top of it and Windows on top of that ).
Well its nice to know that you windows boys are finally catching up at last; but I think I'll stick to a system that I own rather than MS :)

Regards,

Ben

Tricky 12-08-2003 16:27

Quote:

Originally posted by DeadKenny
All it requires is an unpatched server (web, ftp, telnet, etc), a buffer overflow and privallige elevation to root and they're in. They can cause as much damage as they want.

Don't kid yourselfs that linux is secure. It's not. Just that few people have "got it in" for linux.

I use linux, unix and windows systems, and no matter what I always look out for the latest patches. I'd be a fool to just sit there with a smug "ah, I'm okay I use linux" attitude. Of all things I concentrate very carefully on Apache patches as that's the one thing exposed to the outside world on my system.

And has everyone ensured they've got the ICMP patch for their linux based routers? Very few people know about that one and many assume a dedicated linux router/firewall is rock solid and never needs patching, yet this will open their entire network up.

Might also be fair to say that as more is known about the linux code/kernal that the challenge is not there. And the fact that everyone hates Micro$oft.

I gave my Micro$oft account manager some grief today though!:D

DeadKenny 12-08-2003 16:33

Quote:

Originally posted by BenH
Ahh, but has anyone been dumb enough to use it on production systems yet :-)

Big corporates must be evaluating it at least otherwise there's no reason for a software company like the one I work for to be developing and testing on 64bit platforms because our customers request it.

There's no reason why it's a problem. We're talking the NT line here and after all 32bit NT (proper operating system) was way more robust than nasty 16bit DOS/Windows (spawn of the devil ;)), so not much reason why 64bit XP/Server2003 (NT really) is no less robust as 32bit. As with unix, it drops down to 32bit as necessary anyway (slightly better at it than the old 16bit WOW which was more emulation, whereas this relies on the 64bit processor ability to run 32bit... I think).

hawkmoon 12-08-2003 16:38

Quote:

Originally posted by Tricky
Might also be fair to say that as more is known about the linux code/kernal that the challenge is not there. And the fact that everyone hates Micro$oft.

I gave my Micro$oft account manager some grief today though!:D

Yes this is also likely a major factor in it, plus you can be certain that all XP Pro installs will have the same vunerability, which can't strictly be said for Linux as major distro's often do things slightly differently than each other, even down to tweaks in the kernal.

BenH 12-08-2003 16:47

Quote:

Originally posted by DeadKenny
All it requires is an unpatched server (web, ftp, telnet, etc), a buffer overflow and privallige elevation to root and they're in. They can cause as much damage as they want.

Don't kid yourselfs that linux is secure. It's not. Just that few people have "got it in" for linux.



Sure, if your lax in your updates, run as root all the time, dont check for root kits and leave ports wide open then you are screwed. However all the servers you mentioned are turned off initially and if you wanted to turn them on you had better know what your doing. If not then your incompetant or lazy and who cares.

Linux is more inherently secure than the other leading os, mostly because of the security models used. MS sets up their systems to fully integrate into their not so secure infrastructure such as windows update; their programs are riddled with bugs that they have no intention of fixing and hides the running services that can be compromised such as Messenger and allows a user to have administrative priveliges.

It also supports the script kiddies favorite language - VB.


This is not to say that Linux does not have its own problems, the difference is that these exploits are much, much harder to impliment especially against a user who has a clue about security. Also when an exploit is discovered it is paxtched as rapidly as possible. You can also install SE Linux, which promptly deals with the script kiddies, the so called L33T hackers and quite a few of the competant ones, at the possible expense of opening your system up to the NSA :-)


Quote:

I use linux, unix and windows systems, and no matter what I always look out for the latest patches. I'd be a fool to just sit there with a smug "ah, I'm okay I use linux" attitude. Of all things I concentrate very carefully on Apache patches as that's the one thing exposed to the outside world on my system.
And who has the largest number of patches, not including the 150 linux distros which MS loves to factor in on its FUD? And in regard to Apache (given that it mainly runs on Linux), how many patches vs IIS? AIRC the last major exploit was discovered about 18 months ago and had a working patch released within hours.


Quote:

And has everyone ensured they've got the ICMP patch for their linux based routers? Very few people know about that one and many assume a dedicated linux router/firewall is rock solid and never needs patching, yet this will open their entire network up.
We use a Borderware firewall based off BSD, theres a reward of $100,000 for the person who cracks it. If you fancy your luck just say :-)

Regards,

Ben

BenH 12-08-2003 16:52

Quote:

Originally posted by hawkmoon
Yes this is also likely a major factor in it, plus you can be certain that all XP Pro installs will have the same vunerability, which can't strictly be said for Linux as major distro's often do things slightly differently than each other, even down to tweaks in the kernal.
Theres also the fact that as its open source its inherently more secure as the exploits are out there in the open for everyone to see and fix. As opposed to closed source which tries to sweep its mess under a carpet of secrecy.

There is no security in obscurity as any CISSP should be able to tell you.

Regards,

Ben

Ramrod 12-08-2003 19:03

The thread on .com is good

DeadKenny 12-08-2003 19:15

Quote:

Originally posted by BenH
And who has the largest number of patches, not including the 150 linux distros which MS loves to factor in on its FUD? And in regard to Apache (given that it mainly runs on Linux), how many patches vs IIS? AIRC the last major exploit was discovered about 18 months ago and had a working patch released within hours.

I do an update on my RedHat system every month or two and there are more updates than on Windows Update in the same period of time. Half of those RedHat updates are usually described as security fixes. It doesn't really indicate much either way though.

As for IIS vs Apache patches, I don't think IIS has needed a patch for some time, but I'm not going to argue IIS is better (regardless of who has the more patches) because I do prefer Apache myself anyway (running on linux).

The difference with patches is MS "fixes the barn door after the horse has bolted", which is part of the problem, whereas the linux community fixes it usually before it's an issue.

Or rather MS spends a huge amount of time and money regression testing so their fixes are not going to break systems and cost people a lot of money, whereas on linux they fix it and then fix those bugs, then fix those bugs, and you have to wait until someone comes up with a decent fix or you fix it yourself (that's the problem of open source, it's a "do it yourself or wait, test in production" strategy).

MS has often fixed the problem well before it's an issue but as soon as they make the problem public the kids go off and write their virus/trojans/worms knowing a lot of people don't patch. Add to that the fact their fix may be written but not tested so needs time for testing, that gives them time to write the stuff.

darant 12-08-2003 19:25

I can confirm that engineers are dealing with the problem as I type.

downquark1 12-08-2003 20:09

I got all the criticals windows updates from "windows update" is this patch included in the list automatically?

I'm also behind a router.

hawkmoon 12-08-2003 20:24

Quote:

Originally posted by downquark1
I got all the criticals windows updates from "windows update" is this patch included in the list automatically?

I'm also behind a router.

It should be - if you go to windows update there is a link under Other Options called View installation history. Look for a security update with the number 823980 next to it. If you see it in the list then you have been patched.

Alan Waddington 12-08-2003 20:25

Quote:

Originally posted by downquark1
I got all the criticals windows updates from "windows update" is this patch included in the list automatically?

I'm also behind a router.

It should have done, but it's worth checking it actually installed. Windows Update sometimes fails.

If the router is a NAT router, then you should be protected. My router is all that's currently protecting my 2nd machine (W2K), which is currently being defragged before any more updates are applied.

BenH 12-08-2003 20:27

Quote:

Originally posted by DeadKenny
Or rather MS spends a huge amount of time and money regression testing so their fixes are not going to break systems and cost people a lot of money, whereas on linux they fix it and then fix those bugs, then fix those bugs, and you have to wait until someone comes up with a decent fix or you fix it yourself (that's the problem of open source, it's a "do it yourself or wait, test in production" strategy).
Oh come on, how many patches have been recalled for any one linux distro? How many patches crash the server?

I only recall one patch for SuSE 7.3 that had tro be recalled, infact I'm so confident of SuSE doing a good job that all my servers are set to automatically update. Something I would never dream of doing on one of the few remaining NT boxes. MS couldn't care less if one of their patches broke your system for a few hours, after all you cant sue them thanks to the EULA, whereas the open source community cannot dare take that attitude, and quite frankly wouldn't as they take pride in their work.

Sure one or two projects may ignore a bug report, currently there is one in gnomecanvas thats been there for 8 months giving me a headache. People are working on it but it'll take time to come through and in the meantime I can figure out a workaround. While I was writing M$ based apps, I came across quite a few bugs and was faced by a wall of silence by microsoft. They dont care, and they dont need to care, hence part of the reason for the growth of Linux.

Prehaps you should consider changing your distro, after all RH can only handle about 20-30 users at once :D

Regards,

Ben

hawkmoon 12-08-2003 20:41

Quote:

Originally posted by BenH
Theres also the fact that as its open source its inherently more secure as the exploits are out there in the open for everyone to see and fix. As opposed to closed source which tries to sweep its mess under a carpet of secrecy.

There is no security in obscurity as any CISSP should be able to tell you.

Regards,

Ben

Yes this maybe true, but yet again most of the time it is no different to MS, the exploit can only be patched once the vunerability / bug has been detected and by the time it has been detected it is usually a little late as it has already been exploited.

Or are you trying to claim that open source software is bug free?

As Deadkenny says - I see more security updates for my Linux Distro's than I do for Windows.

There are certaily serious issues with Linux, for example IIRC samba versions between 2.0.x and 2.2.7 (I think) had a vunerability that could allow an anonymous attacker to acquire super-user rights - it took them a long-time to block this exploit as you can see with the version numbers.

There are plenty others that allow attackers to get root or super-user rights.

Boths OS's have vunerabilities and eploitable bugs.

The only advantage that Linux really has it that it is more secure out-of-the-box than Windows, but with a little work both can be made pretty secure.

The same goes for IIS and Apache aswell.

Maggy 12-08-2003 20:49

Why does it seem that every thread reduces down to the usual mine is better/bigger/stronger than yours?

Why not just agree to differ and leave it at that?It's not really worth the aggro and besides it's somewhat off topic.

Incog ;)

Ramrod 12-08-2003 21:04

Quote:

Originally posted by Incognitas
Why does it seem that every thread reduces down to the usual mine is better/bigger/stronger than yours?

Why not just agree to differ and leave it at that?It's not really worth the aggro and besides it's somewhat off topic.

Incog ;)

....the voice of reason:D

Ramrod 12-08-2003 21:14

Reuters

BenH 12-08-2003 21:21

Quote:

Originally posted by hawkmoon
Yes this maybe true, but yet again most of the time it is no different to MS, the exploit can only be patched once the vunerability / bug has been detected and by the time it has been detected it is usually a little late as it has already been exploited.

Or are you trying to claim that open source software is bug free?



Certainly not, I do however say that Linux and its mature/Beta grade software has far fewer bugs than its closed source equivalent because of A) Its huge tester base B) The open nature of the code allows others to identify the nature of the bug and correct it if they are able and C) There is a far greater incentive for the programmer to doi a good job. With the code available for all to see, then the programmers ego could be done serious harm by bodging something together :)


Quote:

As Deadkenny says - I see more security updates for my Linux Distro's than I do for Windows.
How many bug fixes and security updates do those service packs hold? The fundamental difference betwen a linux security update and the windows equivalent is that in the Linux case the programmer has spotted one of their own mistakes and corrected it; whereas in MS's case its a matter of them not being able to keep the bug under wraps any longer

Quote:

There are certaily serious issues with Linux, for example IIRC samba versions between 2.0.x and 2.2.7 (I think) had a vunerability that could allow an anonymous attacker to acquire super-user rights - it took them a long-time to block this exploit as you can see with the version numbers.
Can you point me at any references for this? I've just started using Samba 3 extensively to serve as a replacement for PDC's


Quote:

There are plenty others that allow attackers to get root or super-user rights.
There are indeed, most requiring an unimaginable level of stupidity on the users part 'Just set everything in inet.d to 777' or physical access to the system; in which case your doomed no matter what your OS.

Quote:

Boths OS's have vunerabilities and eploitable bugs.
Yes they do, but for one their fixable, for the other you have to wait on bended knee for a fix.

Also could you please start differentiating between bugs and exploits, an overrun that causes X to crash is not the same as allowing code to be executed without the users knowledge.

Quote:

The only advantage that Linux really has it that it is more secure out-of-the-box than Windows, but with a little work both can be made pretty secure.

The same goes for IIS and Apache aswell.
Linux can be made obscenely secure, hence the reason the NSA and many other intelligence agencies uses it. Windows, despite MS's shared source initiative, remains replete with undiscovered and deliberately included exploits because of the philosopy of MS.

Regards,

Ben

BenH 12-08-2003 21:21

Quote:

Originally posted by Incognitas
Why does it seem that every thread reduces down to the usual mine is better/bigger/stronger than yours?

Why not just agree to differ and leave it at that?It's not really worth the aggro and besides it's somewhat off topic.

Incog ;)

Tradition?

:D

Best,

Ben

Richard M 12-08-2003 21:28

Quote:

Originally posted by hawkmoon

As Deadkenny says - I see more security updates for my Linux Distro's than I do for Windows.

Yes but all or most of the Windows flaws are problems with Microsoft software, the bugs in Linux we hear of are usually with third party software such as Apache, not the actual Linux "system".

So, if we take the amount of bugs in Windows and all third party software and compare that to the amount for Linux and third party software, Linux will have quite a few less.

You can certainly feel safer using Linux (I'm using Mandrake 9.1 right now with Mozilla) because most script kiddies will only know how to compromise a Windows system and it takes a bit more knowledge to break into a Linux OS.
Plus, you are more safe from virus and trojans.

As mentioned earlier in the thread, Linux comes pretty secure out of the box anyway, I'm not running any servers on this machine - the most important thing is making sure the system if up to date and the root password is strong.

Lord Nikon 12-08-2003 21:51

Plus when a new linux kernel is released, that is what it is... new

Looking at this recent exploit that has come to light...

Affected Versions....

NT 4 circa 1995?
Windows 2000 2000
Windows XP 2001
Windows 2003 2003

So the issue has existed for 8 years accross 4 platforms..

How much legacy code do they blindly copy between versions?

hawkmoon 12-08-2003 22:39

Quote:

Originally posted by BenH
Tradition?

:D

Best,

Ben

Personally I don't really see it as a "mine is better than yours argument"

I just see the merits of both Windows and Linux - I've got both running here.

As for the advisory in Samba - you can find it here. https://rhn.redhat.com/errata/RHSA-2003-137.html

Samba versions above 2.2.8 don't have this exploit.

hawkmoon 12-08-2003 22:51

Don't get me wrong - I am not in the Windows is better than Linux camp, nor vice-versa.

My point is that all OS's have flaws, both minor and serious.

Already Linux is starting to see an increase in the number of viruses.

Even BSD-based OS's have their flaws and exploits. I remember one that related to a vulnerability with certain SSH installs, though I can't remember what the vulnerability was though.

When more and more crackers and hackers turn their attention to Linux then I think you will see an increase in the number of vulnerabilies / exploits.

Nobody can anticipate every interaction that code can have under every situation and this is why vulnerabilities such as the RPC one can exist in an OS for years before coming to light.

BenH 12-08-2003 23:25

Quote:

Originally posted by hawkmoon

As for the advisory in Samba - you can find it here. https://rhn.redhat.com/errata/RHSA-2003-137.html

Samba versions above 2.2.8 don't have this exploit. [/B]
Looks like it was RH only. SuSE have a similar advisory, but instead detail it to be a buffer overrun with the possibility that it might be publically available. With a mention of the weak encryption generated by a VNC cookie that is well known.

Hardly an internet stopper, but something to keep an eye on.

Thanks,

Ben

BenH 12-08-2003 23:52

Quote:

Originally posted by hawkmoon
My point is that all OS's have flaws, both minor and serious.
So you keep repeating, despite noone disagreeing with you.


Quote:

Already Linux is starting to see an increase in the number of viruses.
3 last year none serious, the only one that was ever any trouble was Bliss back in '97, and that was only a threat untill Alan Cox ripped it apart.

Linux represents a very unhealthy enviroment for any virus, theres no VB macros, no unlocked ports, seperation of users and administrators and lack of binary executables, let alone executables that run without permission.

For an interesting and accurate article on linux viruses, rather than speculation, try this:

http://librenix.com/?inode=21


Quote:

Even BSD-based OS's have their flaws and exploits. I remember one that related to a vulnerability with certain SSH installs, though I can't remember what the vulnerability was though.
And then they are fixed as soon as they are uncovered, as opposed to being hidden. You are completely ignoring the tremendous difficulty in exploiting one of these flaws and the lack of technical knowledge within the cracker community that would be required to exploit them.

Quote:

When more and more crackers and hackers turn their attention to Linux then I think you will see an increase in the number of vulnerabilies / exploits.
1) Linux is a Hacker OS, its growth is in part due to this. 2) Hackers dont crack systems or write viruses _ever_. Theres no challenge, no profit in destroying something bad when you can create something better and give it away. 3) Hackers despise crackers. Crackers are the lowest form of life, who belive that by exploiting some slight loophole they show how clever they are when in fact its been shown time and time again that they are nothing more than arrogant little ****s who have some very basic technical knowledge centred around VB and microsoft. You show some ******* script kiddie some C and they fall apart.

The only ones that have the kind of skill needed to crack Linux or any other kind of Unix are usually far too busy running security companies or writing virus TK's to be used against windows due to some kind of beef they have against MS.

Even if they were to start writing viruses to be used against Linux, it would still be reliant on the user to do something truely stupid in order to allow the virus to propegate.

Quote:

Nobody can anticipate every interaction that code can have under every situation and this is why vulnerabilities such as the RPC one can exist in an OS for years before coming to light. [/B]
The problems with RPC have been known about for years. I seem to recall the CDC writing about the topic time and time again. This vunerability is however new(ish) it is not the first RPC vunerability, and it will be far from the last.

Ben

darant 13-08-2003 00:12

LOL.

Everything is open for exploitation whether it be Microsoft, Linux, Mac. Just cos Microsoft are the largest people think it shouldn't happen.

duncant403 13-08-2003 08:31

It's probably also fair to say that people who run Linux are likely to keep up to date with all the patches and bug fixes that are released.
While some Windows users do, unfortunately a large proportion don't. This is the main reason why Windows virii propagate so well.

BenH 13-08-2003 09:15

Quote:

Originally posted by duncant403
It's probably also fair to say that people who run Linux are likely to keep up to date with all the patches and bug fixes that are released.
While some Windows users do, unfortunately a large proportion don't. This is the main reason why Windows virii propagate so well.

The principle problem with windows update is the sheer number of patches you need to install. Broadband is pratically a requirement for Xp users.

SuSE however, well look here:

http://www.suse.co.uk/uk/private/sup...ity/index.html

There have been 9 updates in the last five months, 10 if you include the kernel patch I'm expecting sometime today and is already available via YaST.

What more do I need to say?

Regards,

Ben

distortal 13-08-2003 10:07

Helping fight W32.Blaster.Worm
 
I'm sure you'll have seen in the news mention of the latest worm that's doing the rounds on the internet - W32.Blaster.Worm. This particular nasty will cause your machine to shut down and is designed to launch a DDoS attack against WindowsUpdate from the 16th. It is causing a whole lotta traffic on port 135 as the worm seeks to propagate itself.

We sat up late last night developing a small app that would use the port-forwarding abilities of a router firewall. Basically the incomming port 135 requests are router to port 10000 before they reach the machine so that Windows ignores them, and the app sends out a Net Send message to the connecting IP advising them they they appear to infected with W32.Blaster and would they please go to a webpage for more info.

It does have the side-effect of messaging back those Messenger spammers that lurk around the net as well, but that's only a plus in my opinion. :D

Most of the scans I get are from other NTL IPs, which indicates that the worm bases it's scanning on the local machine's IP, but there have been a few others. As a guide to how bad it's getting, I received 20 scans this morning while I was in the bath, and I wasn't in there that long. :)

We may release the app when it's complete, but in the meantime check your firewall logs and let us know how many connection attempts you've had on port 135 over the past few days.

timewarrior2001 13-08-2003 10:13

Its great that people are developing ways to combat this worm. But I would hope people would be getting the security update from MS and running the MSblaster fix from symantec. I personally fixed two machines last night this way.

One thing that surprised me was that when I closed MSBlaster.exe from the processes list, approx 3 mins later the machine still shut down, the command had restarted itself, this made removal of the virus a tad tricky......eventually though I got the machine to stay on long enough to remove the infection.

I dont know how many people would be interested in your application, I may be, but firstly I'd have to enquire who you work for

Keep up the good work
TW2001

Mark W 13-08-2003 10:16

well, as of lastnight, this was the fix we were giving out last night.... version 5 i think :erm:

Quote:

Ntl:home customers may currently be experiencing problems with their PC arising from a Microsoft Windows vulnerability. The virus/worm in question which exploits this vulnerability is called W32.Blaster.Worm and it will affect Windows XP (all versions), Windows 2000 and Windows NT.

In order to prevent your machine from repeatedly rebooting please carry out the following:

1. (Broadband customers only) Unscrew CATV (Co-axial) cable at the rear of the cable modem or set-top box †“ this is normally a thick white cable (not required for dial-up)
2. Re-start PC.
3. †œOpen Task Managerââ‚à ‚¬Ã‚ by holding down the CTRL and ALT keys and press the Delete key once.
4. Click on Process tab, and find Msblast.exe.
5. Highlight the file and click 'end process' at the bottom right
6. Say 'Yes' to the warning.
7. Now close Task Manager (by the cross in the top right)
8. Click on †œstartâ €  and choose †œFind⠃¢â€šÂ¬Ã‚ or †œSearchà€Â  then choose files or folders.
9. In the †œlook inâ₠¬Ãƒâ€šÃ‚ box choose †œMy Computerââ‚ ‚¬Ã‚
10. In the †œnamedâ €  box type msblast.exe then click on †œfind nowââ‚ ¬Ãƒâ€šÃ‚ or †œsearchà€Â 
11. If any items are found right click on these and choose delete.
12. If using Windows XP enable the in built firewall (see below)
13. (Broadband customers only) Screw the CATV cable back into the modem or set-top box, (not required for dial-up)
14. (Broadband customers only) Re-start Cable Modem or Set-Top Box, (not required for dial-up)
15. Re-start PC
16. Download the Microsoft Patch (from the link below) choosing †œsave this program to diskâ₠¬Ã‚
17. In the †œsave asâ₠¬Ãƒâ€šÃ‚ window choose †œdesktopà¢ÃƒÂ¢Ã¢â‚¬Å¡Ã‚¬Ã‚  from the dropdown †œsave inâ₠¬Ãƒâ€šÃ‚ box
18. Open the file from your desktop and follow the on-screen instructions.
19. Restart your machine when requested to do so by the patch.

Microsoft Download Links

Windows XP (all versions)

Windows 2000

Windows NT

You should now find that your PC and connection are restored to a working state.

Enable the in built firewall in XP windows

1. In Control Panel, double-click Networking and Internet Connections, and then click Network Connections.
2. Right-click the connection on which you would like to enable ICF, and then click Properties.
3. On the Advanced tab, click the box to select the option to Protect my computer or network.
4. If you want to enable the use of some applications and services through the firewall, you need to enable them by clicking the Settings button, and then selecting the programs, protocols, and services to be enabled for the ICF configuration.

If you are not using Windows XP you may wish to visit
http://www.ntlworld.com/zonealarm/ to obtain advise on another firewall option.


For further information on this issue please see:

Ntl:home Server Status Page
or

Microsoft Knowledge Base

If you continue to experience problems of the same nature, please call the Technical Support Bureau on your relevant support number.

duncant403 13-08-2003 10:27

Quote:

Originally posted by distortal
let us know how many connection attempts you've had on port 135 over the past few days.
I had 140 in the space of an hour...


All times are GMT. The time now is 23:50.

Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2026, vBulletin Solutions Inc.
All Posts and Content are Cable Forum