New "SQLsnake" Microsoft Worm 362
sevenn writes "A new worm, targeting the Microsoft SQL daemon, has been sweeping the net. It uses massive scanning, default passwords, exploits against vulnerable versions and even attempts to brute force passwords.
Here is the (vague) Microsoft bulliten,
the SANS analysis,
and a securityfocus article"
Already over a thousand compromised system- you're apparently only vulnerable
if you run MS SQL, but the worm is causing a substantial spike in traffic to
port 1433 on the net.
McAfee (Score:5, Informative)
Re:McAfee (Score:4, Funny)
"chillin in the hood with the SQLSpida..."
Thousand compromised? (Score:3, Informative)
Long live human stupidity.
Re:Thousand compromised? (Score:2, Informative)
Re:Thousand compromised? (Score:2)
Re:Thousand compromised? (Score:2)
on it in the future. What an auspicious beginning!
Re:Thousand compromised? (Score:2)
MS SQL Server can call arbitrary functions in arbitrary dlls if you have permission.
graspee
Re:Thousand compromised? (Score:4, Informative)
There are also plenty of business apps that run on top of SQL server. The program's installer takes care of setting up the SQL server with little to no knowledge or intervention required on the users part.
Re:Thousand compromised? (Score:2, Insightful)
This is true, but you need to go back a couple years to get to the root of this (fscking stupid) idea.
Visio 2000 installs it by default as well. I can't remember if anything previous did, but that was my first encounter with this. I would love to buy a bag of whatever those in charge of making this idea a reality, but this is not a small thing. You need to consider the hundreds of thousadns (if not into the millions) that are running software that was created 2 or 3 years ago up to now (and the future holds suit as well).
Can someone please remind me why I have to keep using M$ garbage? OOo [openoffice.org] is a great package. There are MUCH better webservers out there [apache.org], and there are MUCH [mysql.org] BETTER [postgresql.org] SQL Servers out there.
I just don't get it...
Re:Thousand compromised? (Score:3, Insightful)
so yes, it is very common. and it will remain very common as long as there are software vendors making SQL based apps and NOT including a legal copy of SQL server, and a SQL maintaince contract in the price of the product.
Re:Thousand compromised? (Score:5, Insightful)
Along comes e-mail, the Internet, databases, web sites, etc. Joe Enthusiastic runs into the President's office and says, "Mr. Smith! I have found a great new way to communicate with our customers!". Mr. Smith, though he is 90 years old, takes a look and says, "Yeah, that looks interesting. Buy one and set it up".
So the company buys one (database server, e-mail server, web site, etc.) and sets it up according the skimpy directions in the box. It works for a while, then blows up, seriously damaging the business.
NOW the company is told, oh, you should have known. You should have known the instructions in the box were incomplete and dangerous. You should have known you needed an 80k/year DBA to use that. You should have known the product was dangerous. You should have known...
Sorry. I am not buying it anymore. And I think the general business world isn't going to buy it much longer. Either the Internet will be abandoned, or there will be heavy, heavy government regulation of who can connect and how. Sort of like the phone company in the 1950's.
My 0.02 anyway.
sPh
Re:Thousand compromised? (Score:2)
We will continue to have incompetant management as long as we continue to have music majors getting MBAs.
Re:Thousand compromised? (Score:2)
Re:Thousand compromised? (Score:5, Insightful)
If they need to make copies, they buy a copy machine. If they need machine tools, they buy them. They also tend to keep these things in locked rooms so joe public can't walk in and trash them.
If they buy computer systems, they leave the passwords blank and expect people to not use them. That's not bad programming, it's stupid users.
Re:Thousand compromised? (Score:5, Interesting)
http://online.securityfocus.com/archive/1/273029 [securityfocus.com]
It's not just stupid users. Somebody chose this machine for the business and it's something that they NEED in order to function. Not only that, they may not have a (practical) way to keep it secure when you look at how the machine is really used. I'd sugggest reading the entire thread, because there are more juicy details into the security problems and politics associated with big machines like these.
Re:Thousand compromised? (Score:2)
...
So the company buys one (database server, e-mail server, web site, etc.) and sets it up according the skimpy directions in the box. It works for a while, then blows up, seriously damaging the business.
I am a bit confused by this pair of comments - are you suggesting that companies should be able to move from experimental use of a product to production use with mission critical contents without the assistance of an expert? That the inadequacy of the information on the packaging implies that it is idiot-proof? Is that the way general business treats vacuum forming equipment or high temperature ovens?
So in short, yes, if they are putting mission critical data into a computer and exposing that computer to the Internet without the assistance of a professional, they should have known better. Likewise, if they put the million dollar prototype in the oven and set the temperature without knowing wether the scale is kelvin, celsius, or farenheit, they deserve to lose the prototype.
Perhaps, if Microsoft is explicitly marketing SQL Server as, "as easy to use as Word!" then they are liable, but I don't think that is what you are positing. It sounds like you are saying that the lack of flashing lights and yellow/black warning tape implies that the software is safe for any purpose.
Not that I disagree that this is what general business is going to whine to congress for, because America is chock full of a bunch of fuckwits who refuse to take responsibility for their own actions. I only hope that congress has the foresight to pretend to listen while making fun of the whiners behind their backs.
Somewhat agree (Score:2)
Re:Thousand compromised? (Score:2, Insightful)
Yes, but who would put an untrain employee with little drive experience and no experience driving a truck, behind the wheel of a tractor trailer and not expect to have the truck cause an accident?
Any company that sets up a database server with out hiring a qualified admin to set up and maintain it is asking for trouble. A qualified admin should have changed the SA password from null. There really is no reason this behavior should be acceptable.
driving a tractor-trailer (Score:2)
We're all saying that qualified sysadmins are necessary, but do we really want to go to *licensed* sysadmins? I have this ugly feeling that at some point, it may well take a license to make that final connection to the Internet. At that point, your ISP will be the licensed party, and you will have to use provided software on a acceptable platform. How many ISPs will allow you to connect on your own authority, assuming that you are licensed, is the next question.
"the internet will be abandoned" (Score:2)
Second, companies *should be* and *are* responsible for security on their computer systems. By your logic, you would also claim that a company shouldn't have to buy locks, cameras or security personal for their buildings, because how would they have known that people exist that can break into a building. Your reasoning is flawed and feeble.
A business is an educated entity. And for your information, the business world, from small to multinational, is going to continue to use the internet in more and more ways for their business. You may not buy it, but that's your mistake.
Re:Thousand compromised? (Score:2)
Buying a solution and installing it without configuration and investigation is dangerous and lazy, whether it's a machine tool, a truck, a copy machine, or a web/database/mail server.
So no, I have no sympathy. Not for the machinist who is sued by his employee that just got a steel rod shot though his shoulder by misusing a machine, nor for the shipper who needs to replace his truck fleet every two years because the undercarriages rust out, nor for the manager whose customer database is released to the internet because his passwords were unlocked.
Re:Thousand compromised? (Score:2)
Re:Thousand compromised? (Score:2)
Re:Thousand compromised? (Score:2)
Oh yeah... I see that one happening! (Score:3, Funny)
Well, I'll just wait here for that...
Re:Thousand compromised? (Score:2)
If they're smart, they also hire a driver, a machinist (or at least an operator), or an admin assistant. None of these technologies run themselves, or run indefinitely without maintainance.
Honestly, I have no sympathy for bottom-line dimwits who think that technology alone is the answer to a tight profit margin. Technology is the tool. The guy with the skills to *use* technology is the real answer.
Hire a goddamned administrator, for crying out loud. If it's worth the investment to purchase the system, it's worth at least that much to invest in someone who can keep it working.
If computer technology is so integral to the business world, how come it's so freakin' hard to find a technology job again? Short-sightedness, that's all I can figure.
GMFTatsujin
Re:Thousand compromised? (Score:3, Insightful)
"Either the Internet will be abandoned, or there will be heavy, heavy government regulation of who can connect and how."
That's just silly.
The number of businesses that rely on the internet to survive, dollar-wise, now far outweigh the number of businesses who are as fed up as you claim. What will happen is that people will make more solid state type servers. Email servers in firmware style setups will be common. Look at Network Attached Storage. What else is that, except a firmwared File Server? Same thing with JetDirect Print Hubs. Beats having to actually run a print server.
THAT is how the industry will respond to the problem you so nicely described.
Re:Thousand compromised? (Score:2)
Sure, Microsoft makes it so easy to install and administer a server, even a squirrel can do it! :-)
While that is very tongue-in-cheek, it is true. I was involved in a discussion recently about how MS is good at keeping the Total Operating Costs low by making their systems administerable by a common squirrel. [I know, the TOC argument is debatable, I was on the other side of it]
Packaged apps (Score:2)
sPh
Re:Thousand compromised? (Score:2)
Worse yet, it is likely at a company who doesn't even have lowly systems administrators that know it's insecure, or that there's even a sa password for sql.
I should still always be behind some sort of access list, but that probably won't help you terribly much, as users are sure to find a way to get the worm on the lan anyways.
Correction (Score:2, Informative)
'According to SANS incident handler Johannes Ullrich, a preliminary analysis shows the code, which has been dubbed "SQLsnake," attempts to log in to the SQL administrator's account on a remote server using a "brute force" password cracker.'
So, it inflicts even systems, that do not have blank sa password. It only inflicts those systems, instantly.
Re:Correction (Score:2)
Yes, via Brute Force. And guess what, if you have your SQL Server open on the Internet then it can be Brute Forced with or without a worm. The same goes for any FTP server, any Web server, and any other service that's open to the public. This has nothing to do with MS SQL server. Also, it is commonly known that brute forcing over the Internet is extremely slow and therefore does not pose much of a risk, even to relatively weak passwords.
Re:Thousand compromised? (Score:2)
THere's also a desktop runtime engine which I think also listens on port 1433, that could be affected by this. This engine might be installed with an application written in VBA using Access or one of the other MS components. These kinds of apps are fairly common in large companies. I wrote one myself for a state government recently (although not installing MSDE).
Re:Thousand compromised? (Score:2)
My boss just handed me his laptop the other day, wanting to know why it had slowed down. (He'd filled the hard drive to under 200K free.) Among the many other unnecessary items I removed was MS SQL Server. I can only guess that it got installed with MS Office, because all he uses the laptop for are PowerPoint presentations, word processing, surfing and game playing.
There are probably a million people out there who don't even know that they're running it.
It goes deeper than that (Score:2)
I don't want to beat on MCSEs any more than they already get it, but MS has cultivated a large number of semi-competent admins for their systems. Therefore, when patches come up, there are a large number of people who DON'T apply the patch and may not even know they are running the service!
C'mon, Code Red is still out there! Not to say that all MCSEs are incompetent, but let's compare it to Java certification. (since I'm a Java dork)
When someone tells me they are Java certified, my eyes glaze over. It means very little (to me) and I still want to devle into their tech knowledge. But it seems like MCSE opens the door to a greater degree, and it shouldn't
Digispid/SQLsnake (Score:5, Informative)
Databases shouldn't be outside the firewall (Score:5, Insightful)
First of all, a DB should never be outside a firewall. It's not necessary.
Second of all, this issue is aided by databases installed with blank admin passwords.
I don't know how you solve this. You can't prevent people from installing software. I guess Microsoft's new MBSA will point out the blank password issue and any patches missing, but...
Re:Databases shouldn't be outside the firewall (Score:2, Interesting)
Re:Databases shouldn't be outside the firewall (Score:5, Informative)
Re:hush! (Score:2)
Typical. You are telling me that anyone who gets burnt by M$ junk is a moron? That makes a whole lot of morons out there. Shame on you for blaming the user again. Thank you, AC and Sheldon for doing it so nastily with words like "incompetent", "stupid". We know what you M$ fan boys really think of people who don't waste all day restarting, patching, and running in circles for Bill Gates.
To think that the parent post was marked as flamebait.
Re:Databases shouldn't be outside the firewall (Score:2)
The preferred route is that users VPN or IPSec in first, but for convenience reasons some situations stipulate that you can't do that, and SQL Server's low bandwidth usage client/server model works wonderfully for WAN or Internet deployed clients.
For convenience, sure, but then you shoudl also at least have accounts set up that can only add or view data, or fux with specific tables and/or databases. If you require more than that (DLL calls, SA powers, etc.) then simple common sense should overrule any remnants of "convenience" for the sake of security.
It's "convenient" to leave young kids at home without anyone to watch them while you go out for a nice romantic dinner, but you don't see many parents doing so. Common sense comes into play and they hire a babysitter.
Default Password? (Score:2)
Hidden installations (Score:5, Informative)
I use VC++ regularly, and am thus a potential propagator of the worm. Thankfully SQL-server was disabled on my install, but you might not be so lucky.
Re:Hidden installations (Score:2, Flamebait)
If you're not the one choosing the products, then you can blame your idiot employer. In this case, when your systems are trashed by the worm because of your employer's dumb decision, then you can just point the finger at them, and go home while they fix the problem.
I'm sorry, but I have no more sympathy for anyone that chooses MS products and then gets burned. You had to see it coming.
Re:Hidden installations (Score:2)
If my Workstation is outside of a Firewall, yes.
two versions out (Score:3, Informative)
the first one just attempts the 'default' null passwd and 'sa' username (the administrator).
The second tries a brute force attack on the passwd.
So no change from trying to telnet into a *nix box as root then....
Re:two versions out (Score:2)
(where's the recall message button
I'll go back to shooting myself in the foot...
Worse than code red in terms of probe volume (Score:2)
I kind of gave up and just ACL'd it on the border router since the volume makes it almost a DoS of my intrusion detection.
Lazy admins again. (Score:2)
But what they didn't address is why would you even expose the SQLServer to the internet to begin with? A SQL server user can do a lot of damage with the sa account. Might as well give them a CMD prompt. There's really no need to have that port open to the outside at all.
I wonder how many internet servers answer port 1521 to SYS/CHANGE_ON_INSTALL. Could PL/SQLsnake be next?
Re:Lazy admins again. (Score:3, Informative)
That default password existed--in beta software--for two weeks before it was found. Slashdot was up in arms about it. Alan Cox personally appologized for letting the default password slip by his check.
I believe that slashdot was correct to get upset about piranah. I think any vendor who distributes software with default passwords deserves the same.
News? (Score:2, Funny)
Holy shit! A flaw in microsoft software? How did this happen???Arent Microsoft systems the most secure systems available???
</sarcasm>
Microsofted (Score:3, Funny)
Re:Microsofted (Score:2)
Re:Microsofted (Score:3, Funny)
Re:Bullshit (Score:2)
How pedestrian can we get here?
Re:Microsofted (Score:2)
It is their fault that the default "sa" account has a null password by default. Granted, whomever is doing the setup of the server should change it as a first step, but how hard is for Microsoft to require a non-null password to be set to continue setup?
Re:Microsofted (Score:2)
Reflection on Priorities (Score:5, Insightful)
Frequently SysAdmins started their jobs in another field, like Engineering, and were sort of migrated over. Little formal training was given, let alone budget for. Most smaller (sub-Fortune 500) operations were more of a congealed mass than a designed network.
Then, when the LAN wasn't hooked to the Internet, and some poor schmuck install MS BackOffice and wanted to instal SMS Server, it told him he had to install SQL Server. A couple of quick clicks and you're done. Odds are, he clicked thru the admin password not thinking he'd EVER touch MS SQL other than as a backend for SMS.
Pity the new admin who inherits such a setup. You think a new admin is given time to actually check a network configuration out, much less do a proper security, performance, license audit? Nope. Get in and tell me why Outlook is saying my deleted folder is empty. I haven't emptied it since 1998 and everything was always there before when I needed it!
Stupid worms/viruses/exploits will prevail until the MENTALITY of management changes. Computers run most modern business, they are not an afterthought. The people that take care of them should be properly trained, with proper budgets. Periodic PM (preventative maintenance) needs to be allowed, scheduled and performed.
I feel pity for the admins who have to deal with these worms. I feel nothing but contempt for the management process that let them get in this position.
Mod that shit up to 6 if you can (Score:2)
I agree (Score:2)
Burn me once, shame on you. Burn me twice, shame on me. How many times are people going to let themselves be burnt by Microsoft's intentionaly easy to break and push onto software?
All the trolls keep ssying, "Linux is not ready for the desktop." Hmphf! I'm so sick of that bull. M$ is not ready for anything. If it really were easier to get work done on M$ desktops and they could be protected, management might be justified in continuing to order new M$ junk. But it's not.
Debian kicks M$'s but, and Red Hat has all the bells and whistles any corporate user could want. At work, I've got one virtual desktop with tiny picutes on a single bar at the bottom of my screen. There's no way to segregate projects, so I have to cycle the little buttons and place keeping fails. A "power user" in the next cube has two freaking monitors eating his desk top, how stupid! The environment lacks useful scripting, and it's impossible to run processes on other M$ machines without getting out of your seat. Walk, click, click, click, where's the automation? Every two years the file formats change enough to make everyone "upgrade". The GUI's constant flux requires constant relearning, and seems to make less sense with every new improvement. Stability is a joke, as is speed. My first 486 gave comperable perfomance and speed back in 1993. It just burns me up. When I go home I sit at a single chair and look into a single good monitor and can control and run processes on any number of computers I can set up behind my firewall. At home, I move plenty of big pictues and files, no problems. Things at home HAVE gotten faster with new hardware. Why do people at management level put up with this expensive, invasive, rights denying, won't even work well with itself junk?
Someone somewhere is going to get the desk top switchover started and M$ is going to vanish. Poof, back into the cloud of hot air they started with.
Default passwords and servers exposed (Score:5, Redundant)
Secondly, as has already been pointed out here, your database server should not be exposed to the net in general. There is usually very little reason to do so. If you need to let other machines access the SQL box from abroad, create an IP Security filter that only allows port 1433 for a specific subnet or ip address.
Don't complain that you got rooted when your login is root/root.
Re:Default passwords and servers exposed (Score:2)
Earlier versions of SQL server install with a blank SA password by default, I believe, and this is what is at the root (no pun) of the problem.
I switched! (Score:2)
What was ASP is now Perl [page1book.com].(look at the link before you click, then look at the address bar after you arrive). What was SQL Server is now MySQL. And what was IIS is now Apache.
I'm sleeping much better these days now that I don't have to scramble every week there is another hideous security flaw announced. Not to mention they(MS) recently stated if they opened their source, even worse flaws would be revealed.
As the new Rush [amazon.com] song(Secret Touch) says, "The way out is the way in".
Re:I switched! (Score:2)
I can tell you without a doubt that Apache runs rings around IIS in terms of its ability and security. That rewrite rule that I just demonstrated is one example - IIS can't do that. There are many other goodies(load balancing, using mod gzip, etc) that I haven't gotten to explore yet.
Perl is an order of magnitude better of a scripting language than ASP(which technically is a script host, not a language per se.) It has a superior regex implementaion, and the best set of libraries available to it that I've seen in any scripting language. Not to mention, its pretty damn fast.
MySQL I suppose compares the least favorably, but there are a few features that make it ideal as a web database. Security and ease of use are very good. It has good built in text indexing. Also, it has a LIMIT keyword that lets you do recordset paging in the database itself rather than in the code. I haven't seen this feature in any other database.
Re:I switched! (Score:2)
Incidentally, most of the (relatively few)problems that Apache has had since version 1.3 are on the Windows version of Apache. [apacheweek.com]
Ugh! (Score:2, Interesting)
One, ok, so, another m$ "exploit". Why does it always have to have this "see, we told you" attitude? After a while, you get tired of finger pointing. Especially when it's all action and little thought. Think? Nah, I'll just complain first and then eat my foot later.
Two, any IDIOT that puts their SQL server on a public network deserves to get it cracked. This would be the same for any db on a public network. I mean, c'mon, a null sa password?! If someone told you to jump off a cliff, would you? Common sense yo! Jeeze..
Fellow
I've worked for companies which take the easy road (hire dumb people to do smart things) and the hard road (smart peeps, smart things) and that's what this is all about. Not m$ as much as the companies that are cost cutting everywhere (except when it comes to executive perks), especially IT.
It is true that m$ does have a lot of security through obscurity issues, but it would be time well spent jumping on the cracked systems than m$. Because, honestly, they don't care. These systems can me made as secure/insecure as the sysadmin wants, so it's really their fault.
Started a couple of days ago (Score:2)
I've been noticing a more-than-usual amount of probes to port 1433 on my firewall during the past couple of days, although it seems to have really spiked up since last night. DShield seems to prove this, as their "movie" [dshield.org] demonstrates.
I hope nobody breaks the blank SA password (Score:2, Funny)
I guess they can use next.
In Other News (Score:5, Funny)
Re:In Other News (Score:3, Interesting)
On the other hand, you know when you've put a Schlage on your door. You can see it, it's "well documented," and it's obvious how you lock it down. Too much MS software isn't well documented, it's not obvious how you lock it down, and the most egregious point is that you might not be able to tell (easily) if it's been installed.
Both are left unlocked by default after installation, though, so I can't point that out. But I think that MS is more like installing 100 locks on your door, some which are locked and some which aren't, some with keys and some without, and nothing to tell you which is which.
Re:In Other News (Score:2)
MS has this server built-in to many installs. It like installing an room air conditioner and the contractor puts a hinge on it so you can use it as a door. Then, he installs a lock on the hinge, but leaves it unlocked, and doesn't even bother to give you the key.
Why this one is especially dangerous (Score:4, Insightful)
The bulletin MS02-020 was just released about a month ago. Only the admins that place a top priority on patches (such as myself) are safe.
I supported NT server for MS for over a year and can attest to the number of admins out there that rely too heavily on anti-virus software. When nimda spread and took over a buttload of systems, it was for this very reason. The thing spread before it could be researched and DAT files updated.
Here's some solid advice for NT/2000/XP/.NET admins:
Use the hfnetchk tool to monitor all NT based computers on your network for installed patches using the syntax hfnetchk -h host1,hotst2,host3 -v -z -s 1. It will also check for SQL, I.E., and IIS patches. Other products such as Office will have to be checked manually. At least Office has the officeupdate web site for easy installation that the users can do. Block email attachments with extensions that viruses use. Have anti-virus software installed that checks avery 2 or 3 hours for updates. Have a properly configured firewall (Blocks well known attacks) in place that only allows incoming session requests for what services are to be made available to the Internet. Lock down any services that are open to the Internet. Have strong passwords for all admin accounts (At least 10 random characters) and create a new one for each admin account once every few months. Same thing goes for any account that can authenticate in any way from the Internet (8 characters and changing every 6 months or so should be okay). If domain authentication is going to be provided to the Internet for some stupid reason, hack the registry so only NTLM v2 is used. Configure all windows computers to use the Peer-Peer node type 0x2. Use switches instead of hubs to prevent evesdropping and assign MAC addresses to ports for your servers to avoid MAC address spoofing. Most of these things are a one time setup. The ones that require maintenance are worth the trouble.
Re:Every two or three hours? (Score:2)
In Norton AV Corp, you set up one machine on the network as a server, let that one grab the updates, then distribute it to the clients. Best thing is, Corp doesn't need to reboot when it gets updates.
Great for lowbandwidth sites.
...but what about the beancounters? (Score:2)
.NET Developers Vulnerable too (Score:2, Informative)
MySQL benefits :) (Score:2)
Also, why does the SQL Server run at all without a password? IIRC in the latest versions the installation prompts you for an 'sa' password to set, but earlier ones didn't do that. Why not just disable the program - when running it having a popup say 'hey - I won't run unless you set a password!' and be done with these types of 'holes' (yes, it's really just lazy admins, but the computer should be doing more thinking for me at this level - perhaps Clippit could bounce up and demand a password be set?)
Re:MySQL benefits :) (Score:2)
I think 1000 is a pretty conservative estimate. (Score:2, Funny)
Grepping my firewall logs for hits to port 1433, I find 1078 hits since midnight, from 39 unique IP addresses.
The majority appear to be dynamic residential addresses -- attbi.com, swbell.net, pacbell.net. Only a few resolve to static addresses. Here's one of the sites that probed me:
http://210.90.207.4/admin.inc [210.90.207.4]
LMAO!
Two ways to install MS SQL (Score:2)
I've not seen that particular bit of advise on any of the pages, though.
DanH
Nice juxtaposition there (Score:2, Funny)
Why The X-Box Network Will Fail
New "SQLsnake" Microsoft Worm
yuk yuk yuk etc
Microsoft's peril, IBM's opportunity? (Score:2)
If I was in IBM I would have a budget set aside to ramp up a scary campaign about this and every other big worm/exploit - I'd be buying the spots right now to go on the offensive.
Gentlemen, your opponent is drowning, so throw the son of a bitch an anvil.
Could similar virii replicate by other means? (Score:2)
Now that the cat is out of the bag that MSSQL is "in play" as a target, I wonder if sealing 1433 and the sa password are enough to head off future attacks.
The linked articles explain how the worm replicates by essentially logging on as an SQL client and storing a copy of itself in the database. Ingenious, but relatively easy to defend. However, couldn't future versions infect any-old-user's PC using standard email/windows virus techniques and then look for an ODBC connection which would hopefully, by now, be configured with a no-longer-blank sa password to seed a new infection? It might even hit more systems because it gets you inside the firewall that closed off 1433?
In other words, is all the
They probably forgot to count (Score:2)
free [postgresql.org] alternatives [mysql.com]
F*CK! Get Over It Folks! (Score:2)
I didn't need all that karma anyway.
another security measure... (Score:3, Insightful)
Some basic thoughts on securing SQL. (Score:4, Informative)
I've just mailed this to a couple of security lists I take part in. Posting here seems like a good idea (although now, of course, I am outed as a SQL Server user)
Please feel free to forward these recommendations to any other lists as you see fit. However, as with all system changes, things can go wrong. Make sure you have backups. I take no responsibility if your SQL server dies. Or if the sun fails to come up :)
use master
exec sp_dropextendedproc 'xp_cmdshell'
sp_OACreate sp_OADestroy sp_OAGetErrorInfo sp_OAGetProperty sp_OAMethod sp_OASetProperty sp_OAStop
The same goes for registry sps
xp_regaddmultistring xp_regdeletekey xp_regdeletevalue xp_regenumvalues xp_regremovemultistring
use master
select name, Password
from syslogins
where password is null
order by name
Finally, MS have released a bulletin [microsoft.com]
Re:Only attacks blank sa passwords (Score:3, Insightful)
and even attempts to brute force passwords.
So either you're telling me, the writer lied... OR... it doesn't just attack blank passwords... so which is it?
There are variants out already. (Score:2)
Re:Another round of M$ bashing (Score:5, Insightful)
Microsoft is semi-innocent on this one.
NOTE: They make their products so even a stupid administrator can install it, and this worm is proof of that!
Re:Another round of M$ bashing (Score:2)
And who marketed their systems on the basis of not needing well trained administrators? That's right Microsoft...
NOTE: They make their products so even a stupid administrator can install it, and this worm is proof of that!
That's half the problem, they make systems the stupid think they can administer. Making something easy to install has very little to do with if it is easy to administer.
Re: (Score:2)
Re:MS Worms (Score:4, Funny)
The fastest way to change your ratio of real people to worm-traffic is post your webpage on Slashdot.
Results guranteed.
Re:Nothing new (Score:2)
Can't we track down these jerks privately, and give them blanket parties, ala Full Metal Jacket [imdb.com]? They won't find any vulnerabilities in my systems, but the extra traffic on my network and cost in disk usage from the logs is as bad as spam.
IANAS(I Am Not A Sadist), but I think I would experience actual pleasure in witnessing spammers and virus/worm writers suffering severe physical pain. I don't mean polite shadenfreude, but sick, sadistic glee. I'm just sick of their puerile crap.
Re:Nothing new (Score:2, Funny)
Re:Enough Already (Score:4, Insightful)
No, that is not quite it. The blame doesn't go entirely to the admin. If I perform a default install of software, it should be secure. Even at the cost of functionality, the default install MUST be secure. This is a great mantra of Unices - secure by default. It ensures that you cannot hose your own machine through ignorance as you learn how to use a piece of software.
MS SQL used to install with a blank admin password by default. That is absolutely critical.
This isn't a huge MS issue
Maximal functionality without regard for security is the Microsoft way. Their OS constitutes the vast vast majority of all remote compromised - even if normalized for percentage of use. If even a few MS SQL admins read this article and patch, it was worth it. The message is not getting out. Microsoft software is often installed insecure by default, and remote rooted.
Re:Enough Already (Score:2)
HA! Maybe for the BSD's and a handful of Linux's, but commercial UNIX's definitely do not tend to this mantra. They load a whole hunk of crappy services typically. Let me know if you've seen a "secure by default" Solaris, HP-UX, or IRIX install lying around, cause it'd sure save me the time to run Titan [fish.com].
This said, I'm very impressed with what Apple has done for the 'default security' of MacOS X, and what Sun has done for Solaris 9. Let OpenBSD be a good example.
Re:Enough Already (Score:2)
Then again, they aren't database services. But at least the database servers that run under UNIX don't require SYSTEM/root access like MSSQL 7.0 to work properly.
Re:Read up (Score:2)
Spreading implies that it's continuing to infect more hosts. If it has already infected all infectable hosts, then it's not able to infect more hosts. If we assume that the random number generator it's using is at least decent, then the number of probes on port 1433 point toward the worm having hit all IP addresses several times (excluding the few addresses that the worm doesn't target -- it skips over 192.0.0.0/8, for example, despite there being a number of legitimate IP addresses in the range).
So with very, very few exceptions, I suspect that most people are either already infected or completely immune, at least as far as the null password worm goes. The brute force cracking worm might be able to spread more, given that it has to employ quite a bit more effort to get into a host.
Re:Solution for the clueless (Score:2)
It works very well and adds an extra level of security.
Re:The Bugtraq article (Score:3, Informative)
Maybe you don't really want to post a huge comment that will require readers to click through anyway (it's too big to display at once).
How about posting a link to the ISS Alert [securityfocus.com] instead? Is that so hard?