lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <02fb01c3611b$7784a9a0$0c351c41@basement>
From: mattmurphy at kc.rr.com (Matthew Murphy)
Subject: Blaster: will it spread without tftp?

"Maarten" <subscriptions@...tsuijker.com> writes:

> I was wondering about the following scenario:
>
> Lots of corporate network are protected by firewalls and users are forced
to
> use a proxy server to connect to the internet. Because of the firewalling,
> the worm will not be able to infect the clients directly from the
Internet.
> Of course there are always servers that are building bridges between the
> corporate network and the internet or laptop users that get infected by
> using their dial-up/DSL @ home.
>
> But if the worm enters the network through for instance an infected
laptop,
> can it still spread around on the network? By analyzing the threads on
this
> list and reading the info provided by anti-virus vendors I tend to draw
the
> following conclusion.
>
> - A worm can enter the network through an infected laptop/workstation or a
> vulnerable server connected to the internet.
> - these infected machines can exploit the vulnerability on other
vulnerable
> systems on the Internal network causing them to reboot (and reboot, and
> reboot)
> - since these other vulnerable systems are using a proxy server to connect
> to the internet and a firewall prevents all other connections, tftp
servers
> on the Internet can not be accessed
> - since tftp servers can not be accessed, msblaster.exe can not be
> downloaded
> - since msblaster.exe can not be downloaded these other systems will not
> start to infect other systems...
>
> Am I correct on these last two points? Or is this only true in case
someone
> puts an infected laptop on the network (that is not able to connect to the
> internet using tftp, while a webserver might be when it is located in a
> misconfigured DMZ environment)?

Incorrect, for most setups.  Some firewalls at the router (NAT, for
instance) block packets into/out of the LAN.  This means that machines from
the internet cannot communicate with the LAN, and visa versa.  However,
machines on the LAN can communicate with *each other* (thus the ability to
connect to the proxy server).  So, if an infected system is introduced, it
*can* spread to the LAN, but infections of systems on the internet will
fail, as they cannot TFTP back to the firewalled box.

>Of course this is only one worm variant
> exploiting this vulnerability and we might have a totally different case
on
> the next one, but I am still curious if I am on the right track
> understanding the impact of the worm.

Yes, indeed.  Had the worm author been more skilled, we probably would have
seen a Code Red style worm, with the entire worm transmitted as shellcode in
the initial packet exchange over 135/tcp.  This would eliminate the efficacy
of blocking TFTP (69/udp) or 4444/tcp.

> I also read something about SP0|1|2 on W2K not being vulnerable to
msblaster
> (probably because of the "universal" offsets used). Is there anyone that
can
> confirm this finding?

I can refute this finding.  Windows 2000 (all service packs) is being
actively exploited by this worm.  Compromised Windows 2000 boxes have been
probing fairly consistently.  eEye's official write-up specifically mentions
W2K Gold-SP2 as vulnerable.  By "Universal" offset, they weren't kidding --
one offset works on Windows 2000 Gold-SP4, all languages, and one offset
works on Windows XP Gold/SP1 32-bit, all languages.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ