Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Apache worm starts to spread
CNET News.com ^ | June 28, 2002, 5:00 PM PT | Robert Lemos

Posted on 06/29/2002 2:47:15 PM PDT by Bush2000

Apache worm starts to spread

Security experts are rushing to decode a worm program that exploits a 2-week-old flaw to infect computers running vulnerable versions of the popular open-source Apache Web server application. The worm is thought to be capable of spreading only to Web servers running the FreeBSD operating system, an open-source variant of Unix, that haven't had a patch applied for the recent flaw. Although few people have reported the worm, it is thought to be infecting vulnerable Web servers worldwide.



"It is spreading," said Domas Mituzas, a systems developer for Baltic information-technology firm Microlink Systems and the first to report the new worm. "It hit us from Poland, and the comments are in Italian, so it could be from any part of the world."

From his early analysis of the worm, the 19-year-old Lithuanian programmer believes it was designed to create a flood net--a collection of compromised servers that can be used in a denial-of-service attack to overwhelm a target with data.

While the initial advisory on the flaw, which was found by network security firm Internet Security Systems, said the Apache hole was exploitable only on the Windows version of Apache, a hacking team called Gobbles later claimed that the flaw could be exploited on all versions of the program. The team released exploits for Apache running on various versions of BSD to prove its point.

That probably helped the creator of the worm do the work, Mituzas said. "Otherwise, it would be really astonishing that someone had been able to write an exploit so fast," he said.

Marc Maiffret, chief hacking officer for network protection firm eEye Digital Security and one of the key analysts of the Code Red worm, agreed that the Apache worm was creating a stable of servers, sometimes called zombies, for later use in an attack.

"It's definitely setting up its own flood net," Maiffret said, but he added that "something even more destructive" could have been included in the worm.

There are 10.4 million active Web sites running on the Apache server, according to British consulting firm Netcraft. While the fraction of those servers running on FreeBSD is a minor share of the BSD, Linux and Unix market, both Mituzas and Maiffret warned that whoever created the worm could modify it to attack Apache running on any version of BSD and potentially Linux, Solaris and Unix.

At present, if the Apache worm tries to spread to any non-FreeBSD system, it will likely crash the session on the server to which the worm had connected. That's not so bad, said Maiffret, but it could cause many servers to crash if the worm develops into an epidemic.

"If the worm keeps hitting you, then it will keep dropping sessions, and it will be similar to a denial-of-service attack," Maiffret said.

The worm does not yet have a name.


TOPICS: Business/Economy; Technical
KEYWORDS: apache; bush2000fantasy; crapware; opensource; virus; worm
Hey, whaddyaknow ... the emperor is wearing no clothes ...
1 posted on 06/29/2002 2:47:15 PM PDT by Bush2000
[ Post Reply | Private Reply | View Replies]

To: Bush2000
There will always be morons that don't patch things. I challenge you this -- Three months from now, what will be the predominate attacks that you pick up as soon as you plug in to the Internet? Not this. It will still be Codered/Nimda from IIS and the MS/SQL worm.
2 posted on 06/29/2002 2:53:56 PM PDT by sigSEGV
[ Post Reply | Private Reply | To 1 | View Replies]

To: sigSEGV
It will still be Codered/Nimda from IIS and the MS/SQL worm.
No doubt. I get hit on port 1433 by about 100 different IPs a day. Plus each IP sends 10 packets to try and do the hack. Annoying. Wish there was some sort of string I could send em to reboot their box.
3 posted on 06/29/2002 3:00:42 PM PDT by lelio
[ Post Reply | Private Reply | To 2 | View Replies]

To: lelio
You ought to see it when you manage a full Class B subnet (65535 public addresses)
:)
4 posted on 06/29/2002 3:03:08 PM PDT by sigSEGV
[ Post Reply | Private Reply | To 3 | View Replies]

For the curious: http://dammit.lt/apache-worm/apache-worm.c
5 posted on 06/29/2002 3:05:29 PM PDT by sigSEGV
[ Post Reply | Private Reply | To 2 | View Replies]

To: sigSEGV
I manage a massive 4 IPs for my home and I get enough ;)
Maybe I should just keep the connection open from their box so they could figure it out. Course I would end up having thousands of open connections.
6 posted on 06/29/2002 3:08:18 PM PDT by lelio
[ Post Reply | Private Reply | To 4 | View Replies]

To: lelio
No doubt. I get hit on port 1433 by about 100 different IPs a day. Plus each IP sends 10 packets to try and do the hack. Annoying. Wish there was some sort of string I could send em to reboot their box.

You too? lol. Yes, it's quite annoying.

7 posted on 06/29/2002 3:10:49 PM PDT by grimalkin
[ Post Reply | Private Reply | To 3 | View Replies]

To: Bush2000
1st serious Apache bug in 4 years.

Compared to IIS, which is on a monthly "critical alert" cycle.

Beauty, eh?

Says a lot about the abilities of open-source for debugging, don'thca think?

8 posted on 06/29/2002 3:14:01 PM PDT by Dominic Harr
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bush2000
Hey, whaddyaknow ... the emperor is wearing no clothes ...

Actually, we've got a new wardrobe, since the patches've been released.

This news is eleven days old, and the code was fixed in two days.

Quoting the apache.org site: 'The Apache Software Foundation has released versions 1.3.26 and 2.0.39 that address and fix this issue, and all users are urged to upgrade immediately.'
9 posted on 06/29/2002 3:53:21 PM PDT by Mike Fieschko
[ Post Reply | Private Reply | To 1 | View Replies]

To: lelio
Dittos. 1433 is hit on over and over. Code Red, Nimda & the SQL garbage must take up most of the bandwith on the net.

Unlike the MS stuff above, this will be patched in an eye-blink.


10 posted on 06/29/2002 4:03:45 PM PDT by isthisnickcool
[ Post Reply | Private Reply | To 3 | View Replies]

To: sigSEGV
You are so right. We are pretty religious about keeping things safe on our Network, but we just had a NIMBDA outbreak last week. Someone plugged in an old serverver that had been sitting idle and fired it up. We caught it, but it still slowed things down for awhile.
11 posted on 06/29/2002 4:08:54 PM PDT by OC_Steve
[ Post Reply | Private Reply | To 2 | View Replies]

To: OC_Steve
We tested Apache 1.3.26 and it passed our compatibility test with our existing software. We'll be updating our Apache servers within our firewall (several hundred, I'd guess) by Monday.

Since all our Apache servers are within our firewall, we're relatively safe from the worm. Also, the majority of our web servers are not Apache, but Netscape enterprise or IBM or Sun. At last count, I think we have over 2000 internal web servers.

12 posted on 06/29/2002 9:54:27 PM PDT by Forgiven_Sinner
[ Post Reply | Private Reply | To 11 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson