The best way to not get hit...
Aug. 15th, 2003 10:04 pm![[personal profile]](https://www.dreamwidth.org/img/silk/identity/user.png)
...is to not be anywhere?
In a not even vaguely bold move, Microsoft went and pulled all DNS for windowsupdate.com. They indicate how it's a smart move.
What they don't tell you is that the worm, given NO IP address to attack... will flood 255.255.255.255 -- a broadcast address, causing it to wreak more havoc on the infected system's segment than it would have before.
SO:
1) MS has a hole for years in their now heavily-code-reviewed software.
2) MS releases a patch and begs everyone to apply it
3) a worm comes out, which will target a DDoS attack at a prominent MS site just 6 days after release
4) MS pulls their address so the worm beats the daylight out of the local victim's network.
THANKS Microsoft!
In a not even vaguely bold move, Microsoft went and pulled all DNS for windowsupdate.com. They indicate how it's a smart move.
What they don't tell you is that the worm, given NO IP address to attack... will flood 255.255.255.255 -- a broadcast address, causing it to wreak more havoc on the infected system's segment than it would have before.
SO:
1) MS has a hole for years in their now heavily-code-reviewed software.
2) MS releases a patch and begs everyone to apply it
3) a worm comes out, which will target a DDoS attack at a prominent MS site just 6 days after release
4) MS pulls their address so the worm beats the daylight out of the local victim's network.
THANKS Microsoft!
Incidentally
Date: 2003-08-16 09:49 am (UTC)"Hey, bugtraq hasn't said /that/!"
So I'm curious as to who has...
Or have you been combing the source? And you know the secret of windows system calls?
Re: Incidentally
Date: 2003-08-16 10:01 am (UTC)Which is to say, the MS pulling DNS, I figured out with dnsq and dnstrace.
The action the worm will take upon receiving no DNS for windowsupdate.com information was provided by Symantec.
That and some friends set it up in their lab, and ran it through its paces. It's almost too straightforward to spend time with a debugger.
Re: Incidentally
Date: 2003-08-16 10:32 am (UTC)Thanks!
(I forwarded it to my Friend, who is trying to start a consulting business. Maybe this will give him some clients, who knows.)
Re: Incidentally
Date: 2003-08-17 02:32 am (UTC)I forgot what I was gonna say.
Anyway, what debugger you using for the harder ones? Just wondering if someone sprung for a copy of IDA pro for ya. I managed to pull that off once (: Sure, I've mostly used it for dissasembling 6502 stuff but it was useful for code red, if only for a few minutes before someone beat me to the full dissasembly (:
Re: Incidentally
Date: 2003-08-17 08:58 am (UTC)