Did not get hit with this ourselves do not run SQL Server but another local
business did that a friend of mine has. Just wanted to advise you all on
this since the fix is simple.

The worm was detected on today at 05:30 GMT. After that it has been detected
from various countries around the world. The worm generates massive amounts
of network packets, overloading servers and routers and slowing down network
traffic. As many as 5 of the 13 internet root nameservers have been down
because of this during Saturday the 25th.

This worm does not infect end user machines at all: it only infects Windows
2000 servers running Microsoft SQL Server. End users might only notice this
worm because of network slugginess. This worm is not a massmailer: it does
not send any e-mails.

The worm only spreads as an in-memory process: it never writes itself to the
hard drive. In this sense it is similar to the Code Red from July 2001.

The worm uses TCP and UDP port 1434 to exploit a buffer overflow in MS SQL
server. Close down these ports on your firewall unless you really need to
have your SQL servers visible to the world.

As the worm does not infect any files, an infected machine can be cleaned by
simply rebooting the machine. However, it will soon get reinfected if the
machine is connected to the network without applying SP2 or SP3 patches for
MS SQL Server.

For patch information, see:
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/
bulletin/MS02-039.asp


To remove this worm you must first apply the following patch from Microsoft:

http://www.microsoft.com/Downloads/Release.asp?ReleaseID=40602


Find additional info at:
http://www.eeye.com/html/Research/Flash/AL20030125.html

http://library.northernlight.com/EA20030125430000018.html?cb=200&dx=2006&sc=
0#doc




Stephen Breen
Email: [EMAIL PROTECTED]
           [EMAIL PROTECTED]

Reply via email to