[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <E19mUEL-00024D-00@maildaemon.generator.co.za>
Date: Tue, 12 Aug 2003 10:11:03 +0200
From: Andrew Thomas <andrew@...erator.co.za>
To: bugtraq@...urityfocus.com, incidents@...urityfocus.com
Subject: RE: DCOM worm analysis report: W32.Blaster.Worm
> From: Dave Ahmad [mailto:da@...urityfocus.com]
> Sent: 11 August 2003 11:36
> Subject: DCOM worm analysis report: W32.Blaster.Worm
> 
.. https://tms.symantec.com/members/AnalystReports/030811-Alert-DCOMworm.pdf
..
If the information contained herein is still correct, then it would appear that the algorithm used for target IP selection is far from optimal, and 
would result in large concentration of traffic around the IP address ranges 
of the initial infections.
While this is probably a bad thing for those concerned, this should at least 
buy the rest of the 'net some time to bunker down and ensure that their 
systems get patched. Unfortunately, scare situations like this may be the 
only way to get most of the machines patched.
Also, if this 80/20 rule for OS selection applies (80% XP, 20% win2k), then 
a lot of countries that are still predominantly running windows 2000 will 
experience a slower infection rate. I haven't run any figures to determine 
exactly what the difference will be, but given that here in South Africa, 
out of a web server version list of 100k odd machines, IIS/5.0 was vastly 
predominant, it would make some difference at least.
Q: Does the exploit use shellcode that includes a call to ExitThread or the 
like, such as *not* to take down the RPC service? 
>From the comment about the mutex lock, it would appear that there is some 
expectation of a reinfection, so I'd guess that that was the case. Still, I'd 
like confirmation. If the RPC service got taken down, then I'm sure that a lot 
of sysadmin's would notice a lot more quickly.
--
Andrew G. Thomas
Hobbs & Associates Chartered Accountants (SA)
(o) +27-(0)21-683-0500
(f) +27-(0)21-683-0577
(m) +27-(0)83-318-4070 
---------------------------------------------------------------------------
----------------------------------------------------------------------------
Powered by blists - more mailing lists