Re: MS SQL WORM IS DESTROYING INTERNET BLOCK PORT 1434!

From: Byron Morton (byronat_private)
Date: Sat Jan 25 2003 - 02:44:14 PST

  • Next message: Steve W. Manzuik: "[VulnWatch] eEye - SQL Sapphire Worm Analysis"

    
     ('binary' encoding is not supported, stored as-is)
    In-Reply-To: <20030125021141.A23211at_private>
    
    This is indeed happening widely tonight. Some of the
    client machines here have been hit as their boxes were
    not patched up properly. We have firewalled access and
    have brought our core switches online again after a
    brief interruption where the traffic here got up to a
    little over 110Mbits/s. The switches simply went into
    failover. The good news is that it is not autonomous,
    so you can control access through port filtering until
    the patches are applied.
    
    The UDP D.O.S. attack: (Random snippets from logs)
    PROTO=UDP SPT=1518 DPT=1434
    PROTO=UDP SPT=1032 DPT=1434 
    PROTO=UDP SPT=1077 DPT=1434
    PROTO=UDP SPT=4319 DPT=1434
    
    /b
    
    >Received: (qmail 1867 invoked from network); 25 Jan
    2003 08:39:23 -0000
    >Received: from outgoing3.securityfocus.com
    (205.206.231.27)
    >  by mail.securityfocus.com with SMTP; 25 Jan 2003
    08:39:23 -0000
    >Received: from lists.securityfocus.com
    (lists.securityfocus.com [205.206.231.19])
    >	by outgoing3.securityfocus.com (Postfix) with QMQP
    >	id A5DACA30A5; Sat, 25 Jan 2003 00:59:36 -0700 (MST)
    >Mailing-List: contact bugtraq-helpat_private;
    run by ezmlm
    >Precedence: bulk
    >List-Id: <bugtraq.list-id.securityfocus.com>
    >List-Post: <mailto:bugtraqat_private>
    >List-Help: <mailto:bugtraq-helpat_private>
    >List-Unsubscribe:
    <mailto:bugtraq-unsubscribeat_private>
    >List-Subscribe:
    <mailto:bugtraq-subscribeat_private>
    >Delivered-To: mailing list bugtraqat_private
    >Delivered-To: moderator for bugtraqat_private
    >Received: (qmail 28308 invoked from network); 25 Jan
    2003 07:06:20 -0000
    >Date: Sat, 25 Jan 2003 02:11:41 -0500
    >From: Michael Bacarella <mbacat_private>
    >To: nylug-talkat_private, wwwacat_private,
    >	linux-elitistsat_private
    >Subject: MS SQL WORM IS DESTROYING INTERNET BLOCK PORT
    1434!
    >Message-ID: <20030125021141.A23211at_private>
    >Mime-Version: 1.0
    >Content-Type: text/plain; charset=us-ascii
    >Content-Disposition: inline
    >User-Agent: Mutt/1.2.5i
    >Resent-From: mbacat_private
    >Resent-Date: Sat, 25 Jan 2003 02:12:54 -0500
    >Resent-To: bugtraqat_private
    >Resent-Message-Id:
    <20030125071254.1B3F7681ADat_private>
    >
    >I'm getting massive packet loss to various points on
    the globe.
    >I am seeing a lot of these in my tcpdump output on each
    >host.
    >
    >02:06:31.017088 150.140.142.17.3047 >
    24.193.37.212.ms-sql-m:  udp 376
    >02:06:31.017244 24.193.37.212 > 150.140.142.17: icmp:
    24.193.37.212 udp port ms-sql-m unreachable [tos 0xc0
    >
    >It looks like there's a worm affecting MS SQL Server
    which is
    >pingflooding addresses at some random sequence.
    >
    >All admins with access to routers should block port
    1434 (ms-sql-m)!
    >
    >Everyone running MS SQL Server shut it the hell down
    or make
    >sure it can't access the internet proper!
    >
    >I make no guarantees that this information is correct,
    test it
    >out for yourself!
    >
    >-- 
    >Michael Bacarella                  24/7 phone: 646
    641-8662
    >Netgraft Corporation                  
    http://netgraft.com/
    >      "unique technologies to empower your business"
    >
    >Finger email address for public key.  Key fingerprint:
    >  C40C CB1E D2F6 7628 6308  F554 7A68 A5CF 0BD8 C055
    >
    



    This archive was generated by hypermail 2b30 : Sat Jan 25 2003 - 06:41:44 PST