[207] in Security FYI

home help back first fref pref prev next nref lref last post

[Security-fyi] Re: New worm activity

daemon@ATHENA.MIT.EDU (Bob Mahoney)
Wed Aug 20 16:12:30 2003

Mime-Version: 1.0
Message-Id: <p05200f0dbb67f57d6e1d@[66.93.190.33]>
In-Reply-To: <p05200f09bb67dfff6470@[66.93.190.33]>
Date: Tue, 19 Aug 2003 12:05:52 -0400
To: security-fyi@mit.edu, itpartners@mit.edu, ilg-net-contacts@mit.edu,
        rcc@mit.edu, ditr@mit.edu
From: Bob Mahoney <bobmah@MIT.EDU>
Content-Type: text/plain; charset="us-ascii"
cc: Security Team <security-internal@mit.edu>
Errors-To: security-fyi-bounces@mit.edu

All-

Please forgive the terse nature of this message, but I want to get this information out to the departmental support folks and those that may find themselves assisting in the recovery of compromised machines today.  This information may not be well-structured for more casual users, and we will be working to make more friendly presentations available later today.

Known issues:

* There's a viable window of opportunity for re-compromise in between when we re-enable a drop, and when the user discovers it is re-enabled (either by reading e-mail or trying it occasionally) and proceeds to look for patches.

Because of this, we ask that those doing clean-up DISCONNECT systems before sending us mail saying they have completed the reformat/reinstall, to allow for some protective configuration changes.

* Compromise during patching is more likely for Windows 2000 than Windows XP.   For Windows 2000, the user has to download a service pack and then obtain the MS03-026 patch.   For Windows XP, the user should always obtain the MS03-026 patch before obtaining SP1, since installing SP1 takes a very long time and re-compromise is extremely likely.

* The user should not attempt to get patches via Windows Update. Using Windows Update increases the amount of time before the machine will have the MS03-026 patch installed.

* Even if the user connects his network cable and then immediately tries to download from Microsoft, the machine will still sometimes be re-compromised. Therefore, we recommend that users set up packet filtering immediately, and only download the patch from Microsoft when that change has been made.   The procedure is:

  Windows XP -- see http://support.microsoft.com/?id=283673

  Windows 2000 -- select adapter
                  Internet Protocol (TCP/IP) Properties
                  Advanced
                  Options
                  TCP/IP Filtering
                  Properties
                  Enable TCP/IP Filtering (All adapters) should be checked.
                  In the TCP ports column, "Permit only" should be checked,
                     and no ports should be added.
                  The other two columns (UDP, IP) can be left alone. In
                     particular, if you choose "Permit only" for UDP, DNS
                     will sometimes not work and the machine won't be able
                     to resolve www.microsoft.com

Afterward (for either operating system), the computer will be able to download, but will not accept incoming connections on any TCP port, and thus it will not be re-compromised by any currently popular worm. 

Users who successfully complete this process should reverse the packet filtering after completing the patch process, so that needed services will be available.

-Bob

_______________________________________________
Security-fyi mailing list
Security-fyi@mit.edu
http://mailman.mit.edu/mailman/listinfo/security-fyi

home help back first fref pref prev next nref lref last post