[21698] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Full analysis of the .ida "Code Red" worm.

daemon@ATHENA.MIT.EDU (Pierre Vandevenne)
Fri Jul 20 01:14:21 2001

From: "Pierre Vandevenne" <pierre@datarescue.com>
To: "Laurence Hand" <lhand@co.la.ca.us>, "Marc Maiffret" <marc@eeye.com>
Cc: "BUGTRAQ" <BUGTRAQ@securityfocus.com>
Date: Fri, 20 Jul 2001 04:08:06 +0200
Reply-To: "Pierre Vandevenne" <pierre@datarescue.com>
In-Reply-To: <3B5770C8.4856618D@co.la.ca.us>
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Message-ID: <99559213401@datarescue.be>

On Thu, 19 Jul 2001 16:44:08 -0700, Laurence Hand wrote:

>Did anyone else see that one of Microsoft's windowsupdate.microsoft.com
>servers got bit by this worm? It went away when we refreshed the screen
>and presumably rolled over to another server, but it is definitely on at
>least one of their servers.

Confirmed. Here's a "souvenir"

http://www.datarescue.com/fprot/virinfo/hackedbychinese.gif

This DOES raise some pretty fundamental questions about the security of
all the infrastructure, because, in theory the compromised servers
_could_ have been exploited more extensively and _could_ be delivering
nastily compromised stuff around. I have no reason to believe it has
happened, but still...


---
Pierre Vandevenne - DataRescue : home of the IDA Pro Disassembler  
Advanced tools for the IT Security Industry. www.datarescue.com/idabase/
SM CF and MS Picture Recovery Software www.datarescue.com/photorescue/







home help back first fref pref prev next nref lref last post