http://www.zdnet.com/zdnn/stories/news/0,4586,2826892,00.html?chkpt=z...
Yet another worm folks.
--
Charlie
Yet another worm folks.
--
Charlie
From the people who brought you the term "Microsoft Security".Quote:> http://www.zdnet.com/zdnn/stories/news/0,4586,2826892,00.html?chkpt=z...
> Yet another worm folks.
Chris
--
Living large and loving Linux!
> Yet another worm folks.
JP
http://www.zdnet.com/zdnn/stories/news/0,4586,2826892,00.html?chkpt=z...
02
Still having comprehension problems Charlie? I think you'll find that's aQuote:> Yet another worm folks.
Rather stupid to be directly opening 1433 to the Internet don't you think?
And then not setting a sa password? You deserve to be hacked doing that.
http://www.zdnet.com/zdnn/stories/news/0,4586,2826892,00.html?chkpt=z...
02
Why even automatically run the service? If SQL is installed without aQuote:> > Yet another worm folks.
> Correction. That would be a SQL Server vulnerability, not iis. It is
> only a problem if the Admin forgets to set a password upon install.
> (Like, duh!).
> JP
Mind you, we are talking about MSCE and MSCA's here ;)
Matthew Gardiner
http://www.zdnet.com/zdnn/stories/news/0,4586,2826892,00.html?chkpt=z...
02
Quoting from a news story about the worm:Quote:> > Yet another worm folks.
> Correction. That would be a SQL Server vulnerability, not iis. It is
> only a problem if the Admin forgets to set a password upon install.
> (Like, duh!).
> JP
Like, duh, Microsoft!
--
Joe User
-----Quote:> 02
> > Yet another worm folks.
> Still having comprehension problems Charlie? I think you'll find that's a
> SQL worm.
> Rather stupid to be directly opening 1433 to the Internet don't you think?
> And then not setting a sa password? You deserve to be hacked doing that.
Microsoft deserves to be hacked, yes, for designing such a brain-dead
installation routine. Not that anyone is surprised.
--
Joe User
> http://www.zdnet.com/zdnn/stories/news/0,4586,2826892,00.html?chkpt=z...
> > 02
> > > Yet another worm folks.
> > Still having comprehension problems Charlie? I think you'll find that's a
> > SQL worm.
> > Rather stupid to be directly opening 1433 to the Internet don't you think?
> > And then not setting a sa password? You deserve to be hacked doing that.
> -----
> Mark Read, security analyst at MIS Corporate Defence Solutions, said, "When
> you install SQL, at no point does it ask you for an administrator username
> and password -- this is installed as standard, and once it is up and running
> the password still remains blank." He added, "If the SQL server is
> accessible from the Internet, people can log in using a blank password and
> have full access to the database, as well as the underlying operating
> system."
> -----
> Microsoft deserves to be hacked, yes, for designing such a brain-dead
> installation routine. Not that anyone is surprised.
>> http://www.zdnet.com/zdnn/stories/news/0,4586,2826892,00.html?chkpt=z...
>> > 02
>> > > Yet another worm folks.
>> > Still having comprehension problems Charlie? I think you'll find that's a
>> > SQL worm.
>> > Rather stupid to be directly opening 1433 to the Internet don't you think?
>> > And then not setting a sa password? You deserve to be hacked doing that.
>> -----
>> Mark Read, security analyst at MIS Corporate Defence Solutions, said, "When
>> you install SQL, at no point does it ask you for an administrator username
>> and password -- this is installed as standard, and once it is up and running
>> the password still remains blank." He added, "If the SQL server is
>> accessible from the Internet, people can log in using a blank password and
>> have full access to the database, as well as the underlying operating
>> system."
>> -----
>> Microsoft deserves to be hacked, yes, for designing such a brain-dead
>> installation routine. Not that anyone is surprised.
> As does anyone running Cisco gear who leaves the default passwords on
> their routers as cisco/cisco. Default passwords are not solely a
> Microsoft problem, and pretending that it is is just silly.
--
Jim Richardson
Anarchist, pagan and proud of it
www.eskimo.com/~warlock
Linux, because life's too short for a buggy OS.
"microsoft deserves to be hacked, yes, for designing such a brain-deadQuote:> >> > 02
> >> > > Yet another worm folks.
> >> > Still having comprehension problems Charlie? I think you'll find
that's a
> >> > SQL worm.
> >> > Rather stupid to be directly opening 1433 to the Internet don't you
think?
> >> > And then not setting a sa password? You deserve to be hacked doing
that.
> >> -----
> >> Mark Read, security analyst at MIS Corporate Defence Solutions, said,
"When
> >> you install SQL, at no point does it ask you for an administrator
username
> >> and password -- this is installed as standard, and once it is up and
running
> >> the password still remains blank." He added, "If the SQL server is
> >> accessible from the Internet, people can log in using a blank password
and
> >> have full access to the database, as well as the underlying operating
> >> system."
> >> -----
> >> Microsoft deserves to be hacked, yes, for designing such a brain-dead
> >> installation routine. Not that anyone is surprised.
> > As does anyone running Cisco gear who leaves the default passwords on
> > their routers as cisco/cisco. Default passwords are not solely a
> > Microsoft problem, and pretending that it is is just silly.
> Perhaps you can point to someone who made such a claim? Or are you
> simply building a strawman?
The fix doesn't require that SQL server be patched, just that a password be
set.
BTW, haven't we had a discussion of leaving database servers out in the open
on the Internet before? IIRC, Borland had a product which had a mysterious
back-door appear after being released as open source. I believe the Borland
engineers pointed out, and rightly so, that it was a bad idea to allow
anonymous access to the database server via the Internet.
----
Bones
The opinions stated here are
my own, and do not necessarily
reflect those of my employer.
Actually, every install of SQL Server i've done has used WindowsQuote:> > Yet another worm folks.
> Firstly, it has nothing to do with IIS. It requires that the admin of a
SQL
> db server doesn't set a superuser password, it must be controlled remotely
> in order to launch a DDOS attack. It is isn't exactly the same as Code Red
> or the Admin worm.
> The fix doesn't require that SQL server be patched, just that a password
be
> set.
Yes, actually it was the pirahna exploit on Red Hat 6.2.Quote:> BTW, haven't we had a discussion of leaving database servers out in the
open
> on the Internet before? IIRC, Borland had a product which had a mysterious
> back-door appear after being released as open source. I believe the
Borland
> engineers pointed out, and rightly so, that it was a bad idea to allow
> anonymous access to the database server via the Internet.
> http://www.zdnet.com/zdnn/stories/news/0,4586,2826892,00.html?chkpt=z...
>> >> > 02
>> >> > > Yet another worm folks.
>> >> > Still having comprehension problems Charlie? I think you'll find
> that's a
>> >> > SQL worm.
>> >> > Rather stupid to be directly opening 1433 to the Internet don't you
> think?
>> >> > And then not setting a sa password? You deserve to be hacked doing
> that.
>> >> -----
>> >> Mark Read, security analyst at MIS Corporate Defence Solutions, said,
> "When
>> >> you install SQL, at no point does it ask you for an administrator
> username
>> >> and password -- this is installed as standard, and once it is up and
> running
>> >> the password still remains blank." He added, "If the SQL server is
>> >> accessible from the Internet, people can log in using a blank password
> and
>> >> have full access to the database, as well as the underlying operating
>> >> system."
>> >> -----
>> >> Microsoft deserves to be hacked, yes, for designing such a brain-dead
>> >> installation routine. Not that anyone is surprised.
>> > As does anyone running Cisco gear who leaves the default passwords on
>> > their routers as cisco/cisco. Default passwords are not solely a
>> > Microsoft problem, and pretending that it is is just silly.
>> Perhaps you can point to someone who made such a claim? Or are you
>> simply building a strawman?
> "microsoft deserves to be hacked, yes, for designing such a brain-dead
> installation routine".
--
Jim Richardson
Anarchist, pagan and proud of it
www.eskimo.com/~warlock
Linux, because life's too short for a buggy OS.
>> Yet another worm folks.
> Firstly, it has nothing to do with IIS. It requires that the admin of a SQL
> db server doesn't set a superuser password, it must be controlled remotely
> in order to launch a DDOS attack. It is isn't exactly the same as Code Red
> or the Admin worm.
> The fix doesn't require that SQL server be patched, just that a password be
> set.
> BTW, haven't we had a discussion of leaving database servers out in the open
> on the Internet before? IIRC, Borland had a product which had a mysterious
> back-door appear after being released as open source. I believe the Borland
> engineers pointed out, and rightly so, that it was a bad idea to allow
> anonymous access to the database server via the Internet.
However, open access to a database does seem somewhat risky yes.
--
Jim Richardson
Anarchist, pagan and proud of it
www.eskimo.com/~warlock
Linux, because life's too short for a buggy OS.
----
Bones
The opinions stated here are
my own, and do not necessarily
reflect those of my employer.
1. TK worm uses IIS Unicode exploit to spread
http://www.theregister.co.uk/content/56/29221.html
US and UK arrests in computer worm probe
By John Leyden
Posted: 06/02/2003 at 15:31 GMT
Two UK men were arrested this morning following police raids in the
UK and US aimed at dismantling an international hacker group believed
to have created a virulent computer worm.
The group has created an Internet worm, called the TK worm, which
infected approximately 18,000 computers around the world, according to
a statement by the NHTCU.
Full Story here
http://www.informit.com/content/index.asp?product_id={6D8E789B-EE44-44F4-8DD6-E3508BE0D366}
Close Encounters of the Hacker Kind: A Story from the Front Line
DEC 20, 2002 By Seth Fogie. Article is provided courtesy of Prentice
Hall PTR.
".. Unicode is one of several methods for encoding letters and numbers
on a computer. What makes Unicode so distinct is that it provides a
unique character for every possible letter or number, regardless of
language, platform, or program. As a result, Unicode is supported by
most major vendors, including Microsoft, which is responsible for the
infamous IIS .."
2. Logitech Marble Mouse ~ Button Mapping?
5. Apache vs IIS 4: IIS 4 3 times faster
7. New Apache worm starts to spread
8. Linux SOCKD with Netscape 2.0
9. Microsoft bugs out - Word macro flaw uncovered along with new IIS security breach
10. New CodeBlue worm uses stealthy attack
11. New worm infests Linux machines/Exposes root backdoor
12. new linux worm
13. New http worm?? Help ID this sucker...