Forum Settings
       
Reply To Thread

new virus out thereFollow

#1 May 01 2004 at 10:14 PM Rating: Decent
Quote:

NEW WORM SPREADS WITHOUT USER INTERACTION
Severity: Medium (May elevate to high in the next few days)
1 May, 2004
---------------------------------------------------------------
For an easier-to-read HTML version of this article, go to:
https://www.watchguard.com/archive/showhtml.asp?pack=11040
---------------------------------------------------------------
ABOUT THE VIRUS:

Beginning Friday evening a new worm called Sasser (technically known
as W32/Sasser.worm) began spreading on the Internet. Like previous
worms (such as Slammer, and to some extent, CodeRed and Nimda),
Sasser relies on exploiting a recent flaw in Microsoft Windows to
spread. If the worm finds a computer vulnerable to the specific
Windows flaw, it infects that PC without any user interaction. Worms
like Sasser that require no user interaction tend to spread wildly.
The good news is that if you have kept up to date with the Microsoft
patches we've recommended in past alerts, and if your Firebox has a
typical configuration, Sasser should pass you by.

WHAT IT DOES:

Unlike most worms, Sasser does not rely on email to spread. Instead,
the worm attempts to connect to random victims on TCP port 445 and
exploits a Microsoft Windows vulnerability we described in an April
13 alert (specifically MS04-011). Its name arises from the fact that
it exploits a buffer overflow in LSASS (Local Security Authority
Server Service) .
If the exploit is successful, the worm downloads a copy of itself to
your machine and adds the file "avserve.exe" to the default Windows
directory. The worm also adjusts the registry to ensure that it can
restart the next time you reboot. In fact, using a special Windows
API, AbortSystemShutdown, Sasser makes it difficult to restart or
shut down your PC.
Finally, Sasser installs an FTP server on your computer, running on
TCP port 5554 so that your machine can deliver the worm to others.
Once installed on a victim machine, Sasser repeats the entire
process by randomly scanning IP addresses on port 445, searching for
exploitable machines. Out of the randomly scanned IPs, 50% are
totally random, 25% have the same first octet as your IP address and
the last 25% have the same first two octets as your IP address. This
helps Sasser to spread efficiently both on the Internet and within
your local network.

WHAT YOU CAN DO:

Make sure you've installed all of the Microsoft patches that we
recommended in our April 13 alert! With these patches installed,
Sasser cannot find a direct path into your network. As you'll see
below, your Firebox is probably already set up to defend against
this worm. However, take extra precautions to protect your network
from your mobile users or visiting customers. If this worm can sneak
its way onto an unpatched Microsoft network, it will be difficult to
contain.

SUGGESTIONS FOR FIREBOX II / III / X, VCLASS, AND SOHO USERS:

All of WatchGuard's firewalls block incoming TCP port 445 by
default. As long as you have not added a service allowing TCP port
445 in, you are protected from Sasser infection via the Internet.
In case your network becomes infected, filtering TCP ports 5554 and
9996 (the ports that the worm uses to spread itself) helps to
prevent your computers from becoming infectious hosts -- that is,
spreading the worm to others. If you don't already egress filter,
follow the instructions specific to your WatchGuard firewall to add
custom services for TCP port 5554 and 9996 and block both incoming
and outgoing access for these ports. The links below lead to
instructions on how to do so.

this also means that most of you behind NAT routers should be rather safe as the default for most routers is to denie anything under 1024 access. i would take the extra step to update your antivirus software, patch your OS (windowsupdate.microsoft.com copy and paste that in your navigation bar of IE), and run a system scan on the above file name to verify that you have not already been infected.

cross fingers and good luck at not getting this one.


putting this on a few of the forums here to help others from getting ganked.

Edited, Sat May 1 23:14:18 2004 by Singdall
#2 May 03 2004 at 8:17 AM Rating: Decent
**
329 posts
I have this and it has been shutting me down constantly. I will run the patches tonight - thanks very much for the info!
#3 May 03 2004 at 9:49 AM Rating: Decent
good luck.
#4 May 03 2004 at 8:48 PM Rating: Default
if your computer is starting to shutdown, and the 30 second dialog box pops up you can run CMD and type shutdown -a to cancel it. hope this helps
#5 May 03 2004 at 8:53 PM Rating: Decent
23 posts
Have been keeping current with this particular thread and have a question. Thank goodness I currently don't have this problem but in the original thread , there was mention made to an original post on Apr 13th. I have searched for this post to no avail... can anyone tell me where to locate it?
#6 May 03 2004 at 9:34 PM Rating: Decent
33 posts
Microsoft's Update site is getting nailed with traffic over the latest security patch (KB828741) - I tried to load the update over a dozen times before it made a connection, so keep trying!

:)
#7 May 03 2004 at 10:14 PM Rating: Decent
thats becuase i get this e-mail from WatchGuard a manufacture of firewalls. one of the compainies that i do IT work for used to use the V10, but i made them get rid of it when i discovered that it does not do true NAT and only does DNAT, thus no port forwarding for hosting their coming WWW and E-Mail servers.

im still on the mailing list for watchguard though so i get their updates for new virii and what not.
#8 May 04 2004 at 10:16 AM Rating: Decent
**
329 posts
Last night, I ran the MS patch and then downloaded and ran this virus scan patch from McAfee. It found and cleaned 2 infected files and I seem to be OK now. Hope this helps someone.
Reply To Thread

Colors Smileys Quote OriginalQuote Checked Help

 

Recent Visitors: 152 All times are in CST
Anonymous Guests (152)