[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-Disclosure] RE: [Full-Disclosure]Ooops-->was-->what to do
- To: <arian.evans@bigfoot.com>, "akbara" <tzu@plepstudios.com>, "Gabe Arnold" <f0x@squirrelsoup.net>
- Subject: [Full-Disclosure] RE: [Full-Disclosure]Ooops-->was-->what to do
- From: "Evans, Arian" <Arian.Evans@fishnetsecurity.com>
- Date: Tue, 12 Aug 2003 01:21:35 -0500
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=utf-8">
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META NAME="Generator" CONTENT="MS Exchange Server version 6.0.6249.1">
<TITLE>RE: [Full-Disclosure] what to do</TITLE>
</HEAD>
<BODY dir=ltr>
<DIV><FONT face=Arial size=2>Per below, you'll probably want to enable port
53 UDP or you won't be able to resolve windowsupdate.microsoft.com. You might
have to enable bootp too, depending on what kind of network you are
on...</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2>If you have further issue, email me @my cc:'d work
address, and I'll answer as I can...</FONT></DIV>
<BLOCKQUOTE dir=ltr style="MARGIN-RIGHT: 0px">
<DIV><FONT size=2>-----Original Message----- <BR><B>From:</B> Arian J. Evans
[mailto:arian.evans@bigfoot.com] <BR><B>Sent:</B> Tue 8/12/2003 1:04 AM
<BR><B>To:</B> 'akbara'; 'Gabe Arnold' <BR><B>Cc:</B>
full-disclosure@lists.netsys.com; bugtraq@securityfocus.com; Evans, Arian
<BR><B>Subject:</B> RE: [Full-Disclosure] what to do<BR><BR></FONT></DIV>
<P><FONT size=2>et al,<BR><BR># has she tried booting into safe mode ?<BR>#
then removing the msblast or what not program ?<BR><BR>If everyone hasn't seen
it by now, the problem is endless<BR>rebooting; we've seen it with a number of
clients...good<BR>luck updating before the system goes down
again...<BR><BR>It's part of the offset the exploit uses and which
OSes/events<BR>it overwrites the proper part of the stack to exploit,
and<BR>which events it just crashes the OS...(the vast majority<BR>of crashes
we are seeing are XP, though some 2k server...)<BR><BR>Bottom line: the
endless shutdown cycle is part of the story<BR>of the worm, given the OS and
how the worm hits it.<BR><BR>But there is a solution:<BR><BR># cannot use
Windows update because when the RPC is shutdown,<BR># SYSTEM automatically
initiates a shutdown of the computer as<BR># you are all aware of. What is the
best solution to keep data files<BR># intact while removing this
worm?<BR><BR>The endless shutdowns are a result of getting banged on
repeatedly<BR>by this worm. Options:<BR><BR>NT 4.0: hmmm...probably disable
RPC service...<BR><BR>Windows 2000: |Network|Local Area Connection (or
whatever you<BR>have named this)|Properties|Advanced|Options|>TCP/IP
Filtering><BR>|Properties|x-enable TCP/IP filtering|<BR><BR>>Permit only
on UDP and ICMP. Do not define.<BR>>Permit only on TCP and define 80 and
443 (http and https).<BR><BR>Continue on to windowsupdate.microsoft.com and
update w/out<BR>further issue. Later, if you feel comfortable (or have the
need),<BR>relax your filter settings.<BR><BR>Windows XP: turn on the included
firewall, found under the similar<BR>options to above for 2k (sorry--I don't
have an XP machine handy<BR>or I'd list the exact steps...)<BR><BR>Good luck,
Cheers,<BR><BR>Arian J. Evans<BR><BR>ps// if bugtraq cross-post is
inappropriate, apology to admins<BR>for having to remove. There's been a lack
of OS-native controls<BR>mitigation discussed on this
issue...<BR></FONT></P></BLOCKQUOTE>
</BODY>
<P><FONT face=Tahoma color=#808080 size=1>The information transmitted in this e-mail is intended only for the addressee and may contain confidential and/or privileged material. <BR>Any interception, review, retransmission, dissemination, or other use of, or taking of any action upon this information by persons or entities<BR>other than the intended recipient is prohibited by law and may subject them to criminal or civil liability. If you received this communication <BR>in error, please contact us immediately at 816.421.6611, and delete the communication from any computer or network system.</FONT></P></HTML>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html