[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 379: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 379: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 112: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 112: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 112: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/functions.php on line 4752: Cannot modify header information - headers already sent by (output started at [ROOT]/includes/functions.php:3887)
[phpBB Debug] PHP Warning: in file [ROOT]/includes/functions.php on line 4754: Cannot modify header information - headers already sent by (output started at [ROOT]/includes/functions.php:3887)
[phpBB Debug] PHP Warning: in file [ROOT]/includes/functions.php on line 4755: Cannot modify header information - headers already sent by (output started at [ROOT]/includes/functions.php:3887)
[phpBB Debug] PHP Warning: in file [ROOT]/includes/functions.php on line 4756: Cannot modify header information - headers already sent by (output started at [ROOT]/includes/functions.php:3887)
Wayfarers of Veeshan • View topic - Exploitation of Vulnerabilities

Wayfarers of Veeshan

An Everquest Guild on Luclin
It is currently Fri Nov 29, 2024 9:49 am

All times are UTC - 8 hours [ DST ]




Post new topic Reply to topic  [ 9 posts ] 
Author Message
PostPosted: Mon Aug 11, 2003 4:54 pm 
Offline
Wayfarer of Veeshan
User avatar

Joined: Fri Jun 21, 2002 9:51 am
Posts: 192
Location: Belton, Texas
CERT® Advisory CA-2003-19 Exploitation of Vulnerabilities
in Microsoft RPC Interface

Original issue date: July 31, 2003
Last revised: July 31, 2003 21:25 UTC-0400
Source: CERT/CC

A complete revision history is at the end of this file.

Systems Affected
Microsoft Windows NT 4.0
Microsoft Windows NT 4.0 Terminal Services Edition
Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003

Overview
The CERT/CC is receiving reports of widespread scanning and exploitation of two recently discovered vulnerabilities in Microsoft Remote Procedure Call (RPC) Interface.


I. Description
Reports to the CERT/CC indicate that intruders are actively scanning for and exploiting a vulnerability in Microsoft's DCOM RPC interface as described in VU#568148 and CA-2003-16. Multiple exploits for this vulnerability have been publicly released, and there is active development of improved and automated exploit tools for this vulnerability. Known exploits target TCP port 135 and create a privileged backdoor command shell on successfully compromised hosts. Some versions of the exploit use TCP port 4444 for the backdoor, and other versions use a TCP port number specified by the intruder at run-time. We have also received reports of scanning activity for common backdoor ports such as 4444/TCP. In some cases, due to the RPC service terminating, a compromised system may reboot after the backdoor is accessed by an intruder.

There appears to be a separate denial-of-service vulnerability in Microsoft's RPC interface that is also being targeted. Based on current information, we believe this vulnerability is separate and independent from the RPC vulnerability addressed in MS03-026. The CERT/CC is tracking this additional vulnerability as VU#326746 and is continuing to work to understand the issue and mitigation strategies. Exploit code for this vulnerability has been publicly released and also targets TCP port 135.

In both of the attacks described above, a TCP session to port 135 is used to execute the attack. However, access to TCP ports 139 and 445 may also provide attack vectors and should be considered when applying mitigation strategies.

II. Impact
A remote attacker could exploit these vulnerabilities to execute arbitrary code with Local System privileges or to cause a denial of service condition.

III. Solutions

Apply patches
All users are encouraged to apply the patches referred to in Microsoft Security Bulletin MS03-026 as soon as possible in order to mitigate the vulnerability described in VU#568148. These patches are also available via Microsoft's Windows Update service.

Systems running Windows 2000 may still be vulnerable to at least a denial of service attack via VU#326746 if their DCOM RPC service is available via the network. Therefore, sites are encouraged to use the packet filtering tips below in addition to applying the patches supplied in MS03-026.

Filter network traffic
Sites are encouraged to block network access to the RPC service at network borders. This can minimize the potential of denial-of-service attacks originating from outside the perimeter. The specific services that should be blocked include

135/TCP
135/UDP
139/TCP
139/UDP
445/TCP
445/UDP

If access cannot be blocked for all external hosts, the CERT/CC recommends limiting access to only those hosts that require it for normal operation.
As a general rule, the CERT/CC recommends filtering all types of network traffic that are not required for normal operation.

Because current exploits for VU#568148 create a backdoor, which is in some cases 4444/TCP, blocking inbound TCP sessions to ports on which no legitimate services are provided may limit intruder access to compromised hosts.

Recovering from a system compromise

If you believe a system under your administrative control has been compromised, please follow the steps outlined in Steps for Recovering from a UNIX or NT System Compromise

Reporting

The CERT/CC is tracking activity related to exploitation of the first vulnerability (VU#568148) as CERT#27479 and the second vulnerability (VU#326746) as CERT#24523. Relevant artifacts or activity can be sent to cert@cert.org with the appropriate CERT# in the subject line.

Appendix A. Vendor Information
This appendix contains information provided by vendors. When vendors report new information, this section is updated and the changes are noted in the revision history. If a vendor is not listed below, we have not received their comments.

Microsoft
Please see Microsoft Security Bulletin MS03-026.

Appendix B. References

CERT/CC Vulnerability Note VU#561284 - http://www.kb.cert.org/vuls/id/561284
CERT/CC Vulnerability Note VU#326746 - http://www.kb.cert.org/vuls/id/326746
Microsoft Security Bulletin MS03-026 - http://microsoft.com/technet/security/b ... 03-026.asp
Microsoft Knowledge Base article 823980 - http://support.microsoft.com?kbid=823980


Authors: Chad Dougherty and Kevin Houle

This document is available from: http://www.cert.org/advisories/CA-2003-19.html


CERT/CC Contact Information

Email: cert@cert.org
Phone: +1 412-268-7090 (24-hour hotline)
Fax: +1 412-268-6989
Postal address:
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213-3890
U.S.A.

CERT/CC personnel answer the hotline 08:00-17:00 EST(GMT-5) / EDT(GMT-4) Monday through Friday; they are on call for emergencies during other
hours, on U.S. holidays, and on weekends.

Using encryption

We strongly urge you to encrypt sensitive information sent by email. Our public PGP key is available from

http://www.cert.org/CERT_PGP.key

If you prefer to use DES, please call the CERT hotline for more information.

Getting security information

CERT publications and other security information are available from our web site
http://www.cert.org/

To subscribe to the CERT mailing list for advisories and bulletins, send email to majordomo@cert.org. Please include in the body of your message subscribe cert-advisory

* "CERT" and "CERT Coordination Center" are registered in the U.S. Patent and Trademark Office.

_________________
Ggnarl Lvl 54 Enchanter
Dnarl Lvl 35 Monk
Ezzqar Lvl 11 Mage


Live Well, Die Spectacually!!!!!


Top
 Profile  
 
 Post subject:
PostPosted: Tue Aug 12, 2003 3:50 am 
Offline
Sky Captain / Officer
User avatar

Joined: Thu Oct 10, 2002 9:50 am
Posts: 2462
Location: Virginia, USA
Magelo: 0
Dnarl,
I'll be the first to admit...I didn't, and can't, read that post without some sort of non-computereeze introduction about what it is for and whether or not I need to do anything.

It's all Greek to me,

Drex

_________________
Drexxell , 71st GNecrOMancEr -- Wielder of ()
Druul , 60th Troll Shaman () + Wielder of and
Driss, 51st Dwarf Priestess of Brell Serilis
Dralia, 36th Erudite Enchantress

Image


Top
 Profile  
 
 Post subject:
PostPosted: Tue Aug 12, 2003 7:07 am 
Offline
Wayfarer of Veeshan
User avatar

Joined: Fri Jun 21, 2002 9:51 am
Posts: 192
Location: Belton, Texas
Sorry was just copying the best infor I could find on it. If you run windows NT, 2000, or XP and are not up to the lastest patches, your computer is open to attack.

_________________
Ggnarl Lvl 54 Enchanter
Dnarl Lvl 35 Monk
Ezzqar Lvl 11 Mage


Live Well, Die Spectacually!!!!!


Top
 Profile  
 
 Post subject:
PostPosted: Tue Aug 12, 2003 7:56 am 
Offline
Friend of WoV
User avatar

Joined: Wed May 28, 2003 8:30 pm
Posts: 642
The simplest description of this:

a Worm has been written to take advantage of a bug found in Windows NT based OSs (NT, 2000, XP, 2003) that will force your computer to shut down in so many seconds (I've heard 60, I've heard 45, don't know which one is right).

To protect yourself from this, run Windows Update from Internet Explorer and install all of the critical patches.

_________________
-- Mindbender Llaffer Outloud
L70 ENC
<select name=Skills>
<option>78 past 1750 :)
<option>272 from 2100
<option>Jewelry:300+Trophy
<option>Tailoring:259+Geerlok
<option>Pottery:256+Geerlok
<option>Smithing:256+15%
<option>Fletching:254+Geerlok
<option>Baking:252+Geerlok
<option>Brewing:251+Geerlok
<option>Research:202+Geerlok
<option>Alcohol Tolerance:200
<option>Fishing:182
</select>


Top
 Profile  
 
 Post subject:
PostPosted: Tue Aug 12, 2003 8:25 am 
Offline
Wayfarer of Veeshan
User avatar

Joined: Fri Jun 21, 2002 9:51 am
Posts: 192
Location: Belton, Texas
I've heard both Llaffer, getting about 4 calls an hour here on it :) Depends on who wrote what. It seems a whole group of hackers got together this weekend and pushed out some nasty code aimed at causing different problems, upto and including running programs on your computer and stealing information off the computer. Just had a customer who had is credit card number stolen with expiration right off the web, they maxed his card over night so be careful with this one.

_________________
Ggnarl Lvl 54 Enchanter
Dnarl Lvl 35 Monk
Ezzqar Lvl 11 Mage


Live Well, Die Spectacually!!!!!


Top
 Profile  
 
 Post subject:
PostPosted: Tue Aug 12, 2003 11:22 am 
If people are having problems loading Windows, Windows Update isn't very useful. I don't recall offhand whether or not you can load IE in Safe Mode.

It may be helpful if someone could explain a way *out* of the death loop.

EVERYONE, dialup or broadband, needs to pay attention to Windows critical updates.

Lastly, I found out about this EQ hack yesterday morning. Where? By reading the FoH boards. While much of their content is dubious at best, interesting and important things often pop up there.

Ox


Top
  
 
 Post subject:
PostPosted: Tue Aug 12, 2003 11:40 am 
Offline

Joined: Mon Jun 17, 2002 2:53 pm
Posts: 3662
Magelo: 0


Top
 Profile  
 
 Post subject:
PostPosted: Tue Aug 12, 2003 12:49 pm 
Offline
Wayfarer of Veeshan
User avatar

Joined: Fri Jun 21, 2002 9:51 am
Posts: 192
Location: Belton, Texas

_________________
Ggnarl Lvl 54 Enchanter
Dnarl Lvl 35 Monk
Ezzqar Lvl 11 Mage


Live Well, Die Spectacually!!!!!


Top
 Profile  
 
 Post subject:
PostPosted: Tue Aug 12, 2003 4:00 pm 
Offline
Wayfarer of Veeshan

Joined: Wed Jun 19, 2002 1:43 pm
Posts: 772
Location: Ohio, USA

_________________
Kithrana Lifeweaver
Cleric of Tunare


Top
 Profile  
 
Display posts from previous:  Sort by  
Post new topic Reply to topic  [ 9 posts ] 

All times are UTC - 8 hours [ DST ]


Who is online

Users browsing this forum: No registered users and 0 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

Search for:
Jump to:  
cron
Powered by phpBB® Forum Software © phpBB Group