Skip to comments.
Slapper worm spanks Apache servers
The Register (UK) ^
| September 16, 2002
| John Leyden
Posted on 09/16/2002 10:29:05 AM PDT by HAL9000
click here to read article
Navigation: use the links below to view more comments.
first 1-20, 21-40, 41-60, 61-80 next last
1
posted on
09/16/2002 10:29:05 AM PDT
by
HAL9000
To: HAL9000
Allow me to seize the moral high ground by not bashing Apache/Linux indiscriminately - instead, I will simply point out that there is no such thing as a fire-and-forget server solution, and that keeping up-to-date with patches and fixes is critical regardless of your choice of platform...
To: HAL9000
To: general_re
The vulnerability exploited by the Slapper (Apache/mod_ssl) worm was fixed beginning with OpenSSL version 0.9.6e. Apache/Linux is not the problem here. The problem (again) is lack of effort on the part of sysadmins. This is usually true regardless of the OS you are running.
4
posted on
09/16/2002 10:41:09 AM PDT
by
ShadowAce
To: HAL9000
Is this related to the recent SSL vunderability in IE and Opera? This sounds like a problem with the way the secure socket layer is being implemented in various platforms, less so an OS bug.
To: ShadowAce
I agree - once a patch is created, it is incumbent upon admins to insure that it is applied where needed, regardless of what OS or application you are running.
However, I'll let someone else descend into the muck about assigning blame for the fact that the hole exists in the first place ;)
To: HAL9000
7
posted on
09/16/2002 10:50:31 AM PDT
by
Doug Loss
To: Doug Loss
The fastest patches in the world aren't worth much if nobody bothers to apply them ;)
To: general_re
Luckily, both Debian and RedHat have automatic update services that any sysadmin with an IQ above room temperature runs at least once a day. Our RedHat boxes have been secure against this exploit for the last month and a half.
9
posted on
09/16/2002 11:07:32 AM PDT
by
Doug Loss
To: HAL9000; general_re; ShadowAce; Liberal Classic; Doug Loss
If successful, a copy of the malicious source code is then placed on the victim server, where the attacking system tries to compile and run it. Anyone want to explain this one to me? Does this mean the attacking system has to use a shell via access like telnet, rsh, etc?
To: Doug Loss
You're preaching to the choir there. Unfortunately, I can think of several thousand sysadmins who flunk that qualification - the number of machines infected is over 11,000 as of this morning ;)
To: general_re
Vide my caveat about IQ and room temperature...
To: KayEyeDoubleDee
Anyone want to explain this one to me? Does this mean the attacking system has to use a shell via access like telnet, rsh, etc? No, worms are by definition automated programs that spread themselves without someone directing it. Telnet and rsh are almost universally denied these days for most places, so I doubt this is how it spreads.
The article is a bit unclear. I guess that the author probably doesn't understand what is going on. How often does the press get details right on firearms? This reads like semi-automatic revolver.
I have not seen a write-up of this particular worm, but when the article says "the attacking system tries to compile and run it" they really mean that the malicious code is already running on the system, but it is not the "full" worm yet. The infamous Morris Worm in the mid-80s worked the same way. Once the worm code was running on the victim computer, it would actually download the rest of itself, compile it, run it, and delete the evidence.
The reason the worm has to compile itself is because the amount of malicious code you can send with a buffer overflow is not very large. Big enough to run a small script, but for anything sophisticated the worm is broken into parts. The first part is what smashes the stack on the victims CPU and installs itself and then runs. The second part finishes the job by hiding its presence and looking for other vunderable computers.
To: HAL9000
Clinton visiting Arizona?
To: general_re
However, I'll let someone else descend into the muck about assigning blame for the fact that the hole exists in the first place ;) Okay. This worm appeared on September 13, but the patch has been available since July 30. The vulnerability to this worm was avoidable with a little due diligence by the system administrator.
By comparison, a recent massive security hole in Windows XP that deletes files when the user merely views a web page containing a malicious URL was known to Microsoft for 11 weeks before they released a fix. Not only is Microsoft assigned the blame for the fact that the gaping hole exists in the first place, they also didn't inform customers of the risk or fix it for nearly 3 months. This is SOP for Microsoft customer support, which is why I avoid their low-quality crap products.
15
posted on
09/16/2002 11:45:49 AM PDT
by
HAL9000
To: Liberal Classic
That makes much more sense.
To: HAL9000
By comparison, a recent massive security hole in Windows XP that deletes files when the user merely views a web page containing a malicious URL was known to Microsoft for 11 weeks before they released a fix.
Tell us, Hall. How many users do you know who were burned by this "massive security hole". I don't know a single one.
17
posted on
09/16/2002 3:44:16 PM PDT
by
Bush2000
To: Doug Loss
The real message here isn't that exploits are possible, it's that they're patched very quickly.
Yeah, that's usually the message that gets conveyed when open source advocates get caught with their pants down around their ankles, braying about poor Windows quality...
18
posted on
09/16/2002 3:46:23 PM PDT
by
Bush2000
To: Bush2000
Tell us, Hall. How many users do you know who were burned by this "massive security hole". I don't know a single one. Have you installed SP1 yet? If not, perhaps you can volunteer for an experiment?
If you've already installed SP1, one of your customers who has not will do.
19
posted on
09/16/2002 4:20:25 PM PDT
by
HAL9000
To: general_re
"However, I'll let someone else descend into the muck about assigning blame for the fact that the hole exists in the first place ;)"
Alright. The reason we have those holes is that greedy capitalist employers try to hire cheap overseas programming labor thus displacing American workers who can not work for less than it takes to live. :) parsy, who has too busy to freep the last few weeks.
6 posted on 9/16/02 10:45 AM Pacific by general_re
[
20
posted on
09/16/2002 4:25:45 PM PDT
by
parsifal
Navigation: use the links below to view more comments.
first 1-20, 21-40, 41-60, 61-80 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson