Slammer slugs Internet, down but not out

A new worm attacking a known vulnerability in Microsoft SQL 2000 Web servers that has been slowing down or halting Internet traffic worldwide could prove as tricky a nemesis as security foes "Code Red" and "Nimda," according to firms tracking the outbreak.

Half a dozen security outlets have issued bulletins describing worm W32/SQL Slammer, dubbed "Slammer." Using a buffer overflow to take over a server, the worm sends out a flood of packets, an effect similar to a denial-of-service attack.

Network Associates Inc.'s Anti-Virus Emergency Response Team (AVERT) estimates that 150,000 to 200,000 servers worldwide have already been infected.

When the attack began around 5:30 a.m. GMT (12:30 a.m. EST), packet loss across the Internet approached 20 percent, according to monitoring firm Matrix NetSystems Inc., in Austin. Packet loss rates are usually less than 1 percent.

One of the countries worst affected was South Korea, where most of the nation's fixed-line and mobile Internet users were unable to access Web sites for nearly half of the day.

"The networks of Internet service providers in South Korea were partially down from about 2:30 p.m. today," said Lee Kin Tae, a technical assistant at the Korean Computer Emergency Response Team (CERT) in Seoul. "From around that time, most people in South Korea cannot use the Internet."

Ten hours after the attack began, traffic flow was picking up, with packet loss down to around 5 percent by Matrix NetSystems' readings.

Recovering from the worm is easy, security firms agree: Installing Microsoft Corp.'s recently released SQL Server 2000 Service Pack 3 solves the problem. Some also recommend system administrators consider blocking traffic on port 1434 from unknown machines.

Firms disagree, though, on the severity of the threat posed by Slammer. Trend Micro Inc. labels the worm "destructive" and "high risk," while Symantec Corp. assesses its damage potential as "low." Network Associates Inc. and eEye Digital Security Inc., one of the first to spot and dissect the worm, both issued high-risk alerts on the worm.

While the worm may be easy to defend against, a vast number of systems remain unprotected.

"It's probably worse than it was three or four hours ago," said AVERT Vice President Vincent Gullotto, about 12 hours after the attack began. "This is not going to be cleaned up any time soon."

"(Slammer) doesn't destroy, remove, hack or extract any data," said Tom Ohlsson, Matrix NetSystems' vice president of marketing and business development. "But it's a very, very aggressive worm about self-replication."

Slammer's speed in spreading itself recalls another worm that rampaged through the Net: Code Red, a scourge that appeared in mid-2001 and infected hundreds of thousands of servers.

Despite the availability of a patch, Code Red caused $2 billion in damage, according to one research firm's estimates. New infections continued spreading more than a year after the worm's discovery, according to several vendors, as some vulnerable systems remained unprotected.

Slammer is "similar in terms of speed, but nowhere near as destructive" as Code Red, Ohlsson said.

The worm is "certainly on the same level" as Code Red in terms of the threat it poses, said AVERT's Gullotto.

A representative of the U.S. National Infrastructure Protection Center (NIPC) confirmed the center was investigating the problems. The NIPC has not posted any alerts on its Web site concerning the worm or vulnerability since Microsoft first identified the weakness in July 2002.

A spokesman for the U.S. Federal Bureau of Investigation declined to comment in detail on the Internet problems, but said, "The bureau is aware a worm was attacking the Internet overnight and we are monitoring it."

The worm hit a day after South Korea's Ministry of Information and Communication (MIC) issued an emergency alert on the possibility of denial-of-service attacks, according to local media. The MIC received reports that South Korean computers were to be used as a springboard for attacks, said the country's Yonhap News Agency.

The Microsoft Security Bulletin concerning this vulnerability can be found online here . A CERT advisory issued Saturday concerning the vulnerability is available here.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?