WinNT Widespread Teardrop Exploit

From: Aleph One (aleph1at_private)
Date: Tue Mar 03 1998 - 21:58:58 PST

  • Next message: Russ: "Re: WinNT Widespread Teardrop Exploit"

    There seems to be a very large Teardrop type attack going on. Rumors are
    that it may not actually be Teardrop but some new vulnerability that
    affects Windows 95, Windows NT and Linux ,but no one seems to have yet
    verified this claim.
    
    This incident may be rated to the recent large attack on NASA sites
    < http://www.news.com/News/Item/0,4,19674,00.html?st.ne.fd.gif.c >
    which in turn may be rated to a threat made by one of the recently raided
    teenagers involved in the "Pentagon" attacks where he suggest that others
    may take retaliatory action for his threatment
    < http://www.wired.com/news/news/technology/story/10666.html >.
    
    You may wish to keep a network sniffer running looking for interesting
    traffic and if you see an attack try and verify if it is indeed Teardrop
    or something else.
    
    Aleph One / aleph1at_private
    http://underground.org/
    KeyID 1024/948FD6B5
    Fingerprint EE C9 E8 AA CB AF 09 61  8C 39 EA 47 A8 6A B8 01
    
    ---------- Forwarded message ----------
    Date: Tue, 03 Mar 1998 23:27:49 -0500
    From: Dale Drew <ddrewat_private>
    To: miigsat_private, mealsat_private
    Subject: WinNT Widespread Teardrop Exploit : iMCISE:IMCI:030398:01:P1R1
    
    
    
                              MCI Telecommunications
    
                             internetMCI Security Group
    
    
    Report Name: iMCI Security Alert - WinNT Widespread Teardrop Exploit
    Report Number: iMCISE:IMCI:030398:01:P1R1
    Report Date: 03/03/98
    Report Format: InFormal
    Report Classification: MCI Informational
    Report Reference: http://www.security.mci.net
    
    ------------------------------------------------------------------------
    
    MCI has received confirmation of an ongoing, widespread
    attack specifically targeting Internet connected WindowsNT
    systems.  We are providing this data in an effort to
    alert you to these attacks, and to possibly provide a
    protection mechanism against them.
    
    This exploit appears to be a variation of the TearDrop
    (http://www.microsoft.com/security) attack that
    has effected Win95 and WinNT machines in the past.
    
    Patches for this appear to be available at;
    
    ftp://ftp.microsoft.com/bussys/winnt/winntpublic/fixes/usa/nt40/hotfixes-pos
    tSP3/teardrop2-fix/Q179129.txt
    ftp://ftp.microsoft.com/bussys/winnt/winntpublic/fixes/usa/nt40/hotfixes-pos
    tSP3/teardrop2-fix/README.TXT
    
    for intel
    ftp://ftp.microsoft.com/bussys/winnt/winntpublic/fixes/usa/nt40/hotfixes-pos
    tSP3/teardrop2-fix/tearfixi.exe
    
    for alpha
    ftp://ftp.microsoft.com/bussys/winnt/winntpublic/fixes/usa/nt40/hotfixes-pos
    tSP3/teardrop2-fix/tearfixa.exe
    
    The attacks appear to be automated and coming from multiple
    sources, sweeping specific systems within a customer's network.
    (eg; possibly obtaining a list of systems via DNS tables, then
    attacking found systems).  You may want to take measures to
    have your Intrusion Detection systems look for sequential
    DNS lookups of your netblocks.
    
    Source addresses of the attack have been forged, one address
    that has been  used in previous attacks is 199.0.154.13 -
    although that address could be changed at any time, since
    the address is a forged, invalid address.
    
    Source ports of the attack, thus far, has been tcp port 4000.
    Although that port could be changed at any time as well.
    
    The attack appears to be focused on .gov and .edu sites, although
    some commercial sites have registered complaints.
    
    Should you have any questions, please feel free to contact myself
    or MCI's Incident Response Team at "securityat_private".
    
    NT, and Microsoft, Security issues can be obtained at;
    
    http://www.microsoft.com/security
    http://listserv.ntbugtraq.com/archives/index.html
    
    
                       SUCCESS THROUGH TEAMWORK
    ================================================================
    
    Dale Drew                                 MCI Telecommunications
    Sr. Manager                                 internetMCI Security
                                                         Engineering
    Voice:  703/715-7058                     Internet: ddrewat_private
    Fax:    703/715-7066                 MCIMAIL: Dale_Drew/644-3335
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 13:43:53 PDT