Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Microsoft

Code Red III 759

drcrja was the first to send us this brief bit about Code Red III which is apparently faster and more vicious than its entertaining predecessors. I'm still wondering what I should do with the hundreds of IPs in my desktop's apache log trying hopelessly to overflow my buffer.
This discussion has been archived. No new comments can be posted.

Code Red III

Comments Filter:
  • Comment removed (Score:5, Insightful)

    by account_deleted ( 4530225 ) on Friday August 10, 2001 @02:41PM (#2109634)
    Comment removed based on user account deletion
  • by Anonymous Coward on Friday August 10, 2001 @04:25PM (#2117776)
    At least give some credit!! That was origionally a spoof of the goodtimes hoax.
  • by I_redwolf ( 51890 ) on Friday August 10, 2001 @01:57PM (#2119502) Homepage Journal
    and start addressing the primary issue at hand. The issue is system administrators need to take proactive measures to make sure their systems have been patched. That's the problem and thats what needs to be addressed. There is nothing significantly fascinating about this program that deserves any noteriarty. It didn't find some weird flaw in design. It just exploits a buffer overflow which has always been a problem in peoples code. It's a really simple thing to fix at that. Enough about Code Red and more about the underlying problem.
  • by Laplace ( 143876 ) on Friday August 10, 2001 @02:14PM (#2121251)
    The newsmakers love it because they get to print lots of muckracking headlines about "another hacker threat," and the "evil red chinese attack on the good guys." A scary computer virus means ratings!

    Microsoft loves it because they get to release patches, and proclaim to the world "we're the good guys, protecting you from those unamerican people who share code!"

    The lawmakers get shits and giggles because now they have a reason to pass new, more restrictive laws regarding comminication across "the information superhighway."

    The prison system salivates over this sort of stuff. It creates more potential for 15 year old kids to be thrown in prison for essentially victomless crimes. Nothing like young ass for the seasoned prison rapists!

    Open source fanatics get another nit to pick with big bad Microsoft. Go free software! No, go open source! No, go free software!

    News like this is the best kind around.

  • by djocyko ( 214429 ) on Friday August 10, 2001 @03:24PM (#2121502)
    To my knowledge, Microsoft didn't even try to mass-mail the patch to their registered customers who might be affected.

    From: Support@iis.microsoft.com
    To: Registered_Users@iis.microsoft.com
    CC:
    Subject: RE: IIS Code Red Worm Patch
    Attachment: Instructions.doc
    Body:

    Hi, how are you?

    We are writing you in response to the Code Red worm that has recently attacked our premium enterprise gold standard web portal system, Microsoft Internet Information Server. We have compiled a set of directions for patching the server, and have included these instructionsin a easy to read Word document. If MS Outlook didn't automagically open this attachment for you, double click on the attachment link above.

    If you have any advice on this file, please email us back!

    See you later!
  • by IronChef ( 164482 ) on Friday August 10, 2001 @03:17PM (#2122235)

    I'm a gun nut, but even I will say that a maker of a defective gun should be liable. If it explodes in your hand, that's an issue. IIS is exploding in a way, and MS should be liable.

    My view is very simple: Things you buy shouldn't suck.
  • by jilles ( 20976 ) on Friday August 10, 2001 @04:03PM (#2122931) Homepage
    Ah coding practices. Sorry, Murphy's law you know. If it can go wrong it will go wrong (and he porves himself right a lot lately). That's why even prorgams that have been around since the early days of UNIX are sometimes caught with their pants down (recent BIND bug anyone).

    Any manual check can be forgotten and be a potential security hole. Once it is forgotten it merely depends on who finds the hole first: script kiddie or code maintainer.

    And lets rub this in deeply, there are plenty of languages that protect you against the single most frequent cause of security leaks that is costing the world billions of dollars in damage annually (and it sure isn't C). Any program that is going to be exposed to hackers (i.e. any internet server software) should never ever be programmed in C. You simply cannot guarantee that the compiler and libraries are correct. Even if your program is correct, those still can be a potential source of bugs. Your average UNIX system likely has dozens of undiscovered potential buffer overflows.

    Us java programmers are laughing our asses of each time a buffer overflow is wreaking havoc on the internet. We don't have to worry about such things. Java may not be the greatest thing, but you can rest assure that buffer overflows won't happen.
  • One problem.... (Score:3, Insightful)

    by JohnTheFisherman ( 225485 ) on Friday August 10, 2001 @03:02PM (#2123804)
    People need to patch servers that don't know they're servers. I have RoadRunner (cable modem), and I looked at my logs, and decided to try and track a few people down via http://ipattackingme. Almost none of them had a website up - just the stock 'page under construction.' So I suspected (and RR tech suppt. confirmed this) that most of these people are running IIS and DON'T KNOW THEY'RE RUNNING IIS.

    RoadRunner is additionally trying to shut down individual cable modems, rather than some of the more extreme measures other providers are using (like killing port 80), so kudos to them. Please get the word out to anyone running 2K or NT to check their box, not just anyone who KNOWS they're running a website.

  • by jcw2112 ( 147992 ) on Friday August 10, 2001 @02:35PM (#2123854)
    I spent a couple of hours yesterday sending out emails to just about everyone that hit my box at home. Just toss the IP into a browser and get some contact info from the site that comes up (if one does come up). I got MANY replies thanking me for finding that "hidden" box on their network.

    And no, this isn't the time to send off an email that says "ditch your M$ crap and goto apache" because most of these poor admins aren't running IIS because they WANT to...it's what they HAVE to do.

    So let's take back some bandwidth already!

  • by Keith Russell ( 4440 ) on Friday August 10, 2001 @02:35PM (#2123855) Journal
    ...I still think Microsoft is guilty here because their customers weren't aware their Windows-running boxes could start chewing up bandwidth...
    If you are a sysadmin responsible for any server, regardless of operating system, it's your job to be aware. Microsoft's poor record may drive up the frequency of patches, but that doesn't change the fact that the difference between a good sysadmin and a bad one is the knowledge that no server runs itself.
  • Re:Copycats (Score:5, Insightful)

    by Syberghost ( 10557 ) <syberghost@syber ... S.com minus poet> on Friday August 10, 2001 @02:01PM (#2124290)
    Get over it. Code Red is dead.

    The folks here at the Fortune 500 company I work for who have been working around the clock since Wednesday trying to clean up this mess will be real happy to hear that you don't believe it exists.
  • by mblase ( 200735 ) on Friday August 10, 2001 @02:24PM (#2125790)
    Remember the recent Ford Explorer/Firestone fiasco? Firestone made a bunch of flawed tires (when and where is not important here) that were put on these Explorer SUVs, which in some cases fell apart and came off the wheel when driving at high speeds. Investigations were made, and eventually Firestone had to issue a complete recall of the tires.

    The media talked about it for weeks. Ford sent out letters to customers as far as they could find them. People brought their SUVs in, got new tires put on them, drove out. That's how product recalls usually go.

    Software patches aren't all that different. When a hole is discovered, a patch is made. Responsible Microsoft server administrators have the MS site automatically checked on a daily basis for critical updates and patches. Irresponsible admins don't bother, and they become vulnerable and the cause of the worm's spread.

    But it would be insane to propose MS should force-feed this server patch to all their customers. The problem isn't the software, it's the admins. You'd be hard-pressed to find a major newspaper in the civilized world that hasn't mentioned this worm yet, and still there are people who don't bother to patch. They're the same ones who think that server software is just like desktop software, where you're the only one who uses it that really matters.

    Firestone couldn't make its customers bring their SUVs in to have the tires replaced for free, and there's no way the customers could claim ignorance of the problem after the press got done with it. Likewise, Microsoft can't make its customers upgrade their software for free. They've honestly tried to make all their server customers aware of what's expected of them, but they're as powerless to force it to happen as Firestone is to force car drivers to rotate their tires every 6,000 miles.

  • by Todd Knarr ( 15451 ) on Friday August 10, 2001 @01:56PM (#2129034) Homepage

    My suspicion is this is Code Red 2. One of the AV companies used "CodeRed.v3" or something similar to refer to Code Red 2, and I'd bet the journalists were just too clueless to figure out that the two names refer to the same thing.

  • by Jerf ( 17166 ) on Friday August 10, 2001 @04:30PM (#2130206) Journal
    They quote a columnist for Microsoft's TechNET who makes the false claim that IIS is more popular than apache, and attributes the widespread exploits to that (false) popularity!

    More popular with whom? If there's anything these worms have shown us, it's that there's a HELL of a lot more IIS installations then anybody would really have guessed, due to the ease of installing it without even realizing it with Windows 2000.

    IIS and Apache may be roughly comparable for "real" websites, but in terms of sheer number of installations, I'd now bet that IIS is creaming apache.

    Before you get too huffy, note this is a bad thing, as it has provided a fertile breeding ground for these worms, while providing little-to-no benefit in return.

    "More lusers with vulnerable web servers then ever before - Microsoft Windows 2000."

  • by Anonymous Coward on Friday August 10, 2001 @02:25PM (#2130415)
    Because the patch doesn't block all infections

    http://www.incidents.org/diary/august2001.php#801 [incidents.org] courtesy of incidents.org

  • Re:Copycats (Score:1, Insightful)

    by Anonymous Coward on Friday August 10, 2001 @02:10PM (#2134024)
    Well if they had written it write the first time there'd be no need for duplicates because it would have been decent enough to trash IIS when it was done.
  • by TheMidget ( 512188 ) on Friday August 10, 2001 @03:43PM (#2136720)
    The buffer overflow we're talking about is not in an OS kernel (Windows), but in an application (the IIS webserver), for chrissakes! And yes, there are webservers coded entirely in Perl. For example, webmin [webmin.com]'s miniserv. And I'm sure, there are webservers entirely coded in Java too (tomcat?).

    The thing is, with Perl and Java, the language's runtime handles memory allocation/de-allocation. And barring a bug in the language itself, there's no way an app written in such language can overflow a buffer. Either the buffer will be grown dynamically to fit the data, or the app will get an exception. But corruption of unrelated data cannot happen in this way.

  • by SethJohnson ( 112166 ) on Friday August 10, 2001 @01:53PM (#2137134) Homepage Journal


    Taco, I recommend you sign up with one of those online casino sites and host banner ads on your server with the file name of /default.ida. You should be able to rack up a few thousand unique page views a day by pointing the scourge at the scourge (ala Fist Full of Dollars).
  • by Phroggy ( 441 ) <slashdot3@ p h roggy.com> on Friday August 10, 2001 @03:28PM (#2143921) Homepage
    Code Red II doesn't give you Administrator access; root.exe usually runs with the privaleges of the Internet Guest Account.
  • by garcia ( 6573 ) on Friday August 10, 2001 @03:10PM (#2147143)
    They probably understand the fact that there is VERY little that they can do (other than blocking port 80) than inform their users of what to do. At least they are giving "Worm? I have a worm in my computer? There's no dirt in there" guys the information.

    As much as I hate Verizon and their bullshit, at least they are trying to do something.

    Gotta give em SOME credit ;)

  • by Keith Russell ( 4440 ) on Friday August 10, 2001 @03:11PM (#2147147) Journal
    ...most of the sites were Joe Schmoe's cable modem surfmachines with nothing on. Their only crime was to purchase the damned software.
    IIS doesn't even run on 9x, ME, or other spawn of 3.x. 2000 Professional* does not install IIS by default. Your Joe Schmoe must have either installed IIS after installing W2kPro, or installed W2k Server, which does install IIS automatically. Either way, he took deliberate action to make his PC a server, and with it, took on the responsibility of keeping that server up-to-date.

    Claiming that Microsoft should be liable for sysadmins who are some combination of naive, out of touch, unqualified, or just plain stupid is like claiming that I can sue Honda because my parked car was sideswiped by an unlicensed, drunk driver who just happened to be in an Accord.

    *: This also applies to NT 4.0.
  • by blang ( 450736 ) on Friday August 10, 2001 @02:27PM (#2147256)
    Because we're not talking about admins, but gullible users. When I did a quick toor to the hacked sites in my apache log, most of the sites were Joe Schmoe's cable modem surfmachines with nothing on. Their only crime was to purchase the damned software. Nobody ever told them that the software is considered harmful, and needs constant babysitting. Sounds like a good enough reason for a class action law suite to me.
  • Re:Bah. (Score:3, Insightful)

    by Syberghost ( 10557 ) <syberghost@syber ... S.com minus poet> on Friday August 10, 2001 @01:58PM (#2147258)
    No, this fun new version is "XXXXXXXX".

    And the only thing I saw wrong in that report is that they believed the companies in question when they reported "isolated" problems that have already been fixed.

    I've got entire projects sitting dead in the water because one server relies on one piece of third-party software that can't operate with Service Pack 6a, and so can't be brought up until they find a solution.

    The pisser is none of MY servers were affected, but I'm still dead in the water because of a bunch of idiots on other teams and projects.
  • by asackett ( 161377 ) on Friday August 10, 2001 @07:23PM (#2151711) Homepage
    However, I had no luck with doing a "dir c:\*.*" previously so...

    You may get 403'd several times, as the infected machines reach their limits after a while. Just keep poking at it, you'll get your directory listing. What you won't get, though, is privilege enough to shut down either IIS or the OS itself, format the drives, reboot the box, etc.

    Some folks have taken to leaving graffiti in infected machines as they find them. It's awfully tempting...

  • by cr0sh ( 43134 ) on Friday August 10, 2001 @03:19PM (#2153089) Homepage
    I can't count the number of times when patches have been applied to NT-based servers, only to have other server software (generally third-party) die after the patch is put into place.

    Certainly, applying the patch is a necessary thing - but when you look at it from a business perspective, which is worse:

    1. Apply the patch, have our other server stuff stop working (say, our lovely ASP stuff), and lose money - but save the rest of the internet.
    2. Don't apply the patch - we keep making money - and screw everybody else - we will wait.

    Suddenly, it all makes sense...
  • by Anonymous Coward on Friday August 10, 2001 @02:27PM (#2153390)
    The higher the profile, the better, that's one of the reasons MS software is such a target.

    Windows get's targeted because it's the most common OS. Apache is the most common web server; why isn't apache targeted? Nothing MS is known for it's great security or reliability; Why is it always the MS product that gets hit with a virus/worm? Because it's easy.

  • So does the GPL (Score:2, Insightful)

    by roju ( 193642 ) on Friday August 10, 2001 @09:16PM (#2153538)
    Have you ever read the GPL?

    It specifically disclaims any and all liabilities and warranties.

    If the Microsoft EULA disclaiming responsibility is invalid, isn't the GPLs? If you argue that GPLed software is free, so consumer protection laws don't apply, then what if you paid Red Hat $15 for their distribution?

    Regardless of whether you paid them for the packaging or the 1-800 support number, you bought something from 'em, so shouldn't they be liable if your linux box ruins your MySQL database?
  • by darkPHi3er ( 215047 ) on Friday August 10, 2001 @05:18PM (#2154273) Homepage
    Read the MS EULA (End User License Agreement)

    for example, if you load MS/NT/W2K on a PC that controls your companies Fire Alarms and because of a virus/worm/???? your Fire Alarms are down when a fire starts and burns your business to the ground (including physical injury to staff)....

    MS is NOT liable for one red cent of any kind of damagaes....

    MS was certainly not the first S/W company to immunize themselves from product liability through licensing....

    BUT, the MS license agreement is one way non-negotiable (Take it or Don't Load It), not subject (by the user) to any modification under any circumstances (if a consultant GUARANTEES anything about Windows performance that's not binding on MS) and best of all....

    the mere fact that you install the s/w is COMPLETELY BINDING ON YOU AND ALL YOUR COWORKERS...

    SO, if over your loud objections, your IS/IT dept installs W2K in your department and it crashes another app (say an Oracle8 database on Solaris) and destroys it completely, well, the mere act of installation binds you completely, even if you didn't want it, didn't need and told everyone that if ruin your existing applications...

    NOW THAT'S ***INNOVATION***

Real Programmers don't eat quiche. They eat Twinkies and Szechwan food.

Working...