Concerns mount over possible big Net attack

Security experts warn that a recently disclosed security vulnerability in Microsoft's Windows operating system may soon be used by a powerful Internet worm that could disrupt traffic on the Internet and affect millions of machines worldwide.

The vulnerability, a buffer overrun in a Windows interface that handles the RPC (Remote Procedure Call) protocol, was acknowledged by Microsoft in a security bulletin, MS03-026, posted on July 16.

On Thursday, the U.S. Department of Homeland Security updated an earlier warning about the RPC vulnerability, noting increased network scanning and the widespread distribution of working exploits on the Internet.

The vulnerability affects almost all versions of Windows and could enable a remote attacker place and run malicious code on affected machines, giving them total control over the systems, Microsoft said.

No user interaction would be required for machines to be compromised, prompting security experts to liken the RPC vulnerability to the buffer overflow vulnerability in Microsoft's Internet Information Server (IIS) that was exploited by the Code Red worm in July, 2001.

"I would compare (RPC) to Code Red. It doesn't require user interaction and the number of infectable machines is on same order of magnitude," said Johannes Ullrich, chief technology officer at The SANS Institute's Internet Storm Center.

However, where Code Red affected a component typically found on Windows servers, the RPC vulnerability affects a component found on both Windows servers and desktops, according to Tomasz Ostwald, a co-founder of Polish research group Last Stage of Delirium, which discovered the RPC flaw and reported it to Microsoft.

That increases the number of vulnerable machines from a few hundred thousand systems for Code Red to several million for RPC, he said.

Concern heightened last week when code designed to exploit the RPC vulnerability appeared on the Internet on July 25.

Soon after the release of the exploit, known DCOM RPC, after the flawed Windows Distributed Component Object Model (DCOM) interface, the Internet Storm Center noted an increase in scanning on ports used by the affected interface, Ullrich said.

Much of that activity is disorganized, however, and does not necessarily mean that a widespread attack or DCOM RPC worm is in the works, he said.

"Most of what we've seen is people using (the DCOM RPC exploit) as part of regular hacking activity: (Web site) defacements or people just compromising machines," he said.

However, recent posts to security newsgroups suggest that hackers and computer security experts have been enthusiastically modifying and swapping the exploit code since it was released.

Whereas the original DCOM RPC exploit code worked only on machines running English language versions of Windows 2000, recent modifications show that the code has been modified to exploit the same vulnerability on French, Chinese, Polish, German and Japanese versions of Windows 2000, XP and NT. (See http://www.k-otik.com/exploits/07.30.dcom48.c.php)

RPC is at a stage similar to that of a widespread Microsoft SQL vulnerability after exploit code for that vulnerability was published by security researcher David Litchfield of Next Generation Security Software in August 2002, according to Ullrich.

That exploit code was later modified to create Slammer, one of the most widespread worms to exploit disclosed vulnerabilities.

In its present form, the DCOM RPC exploit code that has been made public is probably not ready for wide distribution as a worm, according to Ostwald.

The code is not fully developed and often relies on variables, such as the presence of particular flavors of Windows, to work, he said.

In contrast, Last Stage of Delirium developed so-called "proof of concept" code for use internally that works against a wide variety of Windows platforms and requires only the IP (Internet Protocol) address of the vulnerable machine to create a buffer overflow, Ostwald said.

Such code would be "very useful" to worm writers, making it easy for a worm to spread from machine to machine, he said.

Hackers are also working on shrinking the exploit code, narrowing the exploit to work on a small set of platforms that will net the most compromised machines, Ullrich said.

However, the release of a worm that uses DCOM RPC is unpredictable, he said.

While it typically takes a couple months from the time of a published exploit to the development of a worm, the development of a worm that takes advantage of the RPC vulnerability may be influenced by other factors such as media attention or this week's DEFCON conference in Las Vegas, a popular gathering point for hackers and computer security experts, he said.

"These things are really random. It just takes one guy to put in the effort," Ullrich said.

In the end, the media attention given to the problem may prompt more administrators to patch vulnerable systems, blunting the effects of a worm once it is released, Ostwald said.

In fact, the period of greatest danger from the RPC vulnerability may be now, before a widespread attack on vulnerable systems has been launched, Ullrich said.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Paul Roberts

IDG News Service
Show Comments

Cool Tech

Toys for Boys

Family Friendly

Stocking Stuffer

SmartLens - Clip on Phone Camera Lens Set of 3

Learn more >

Christmas Gift Guide

Click for more ›

Brand Post

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Aysha Strobbe

Microsoft Office 365/HP Spectre x360

Microsoft Office continues to make a student’s life that little bit easier by offering reliable, easy to use, time-saving functionality, while continuing to develop new features that further enhance what is already a formidable collection of applications

Michael Hargreaves

Microsoft Office 365/Dell XPS 15 2-in-1

I’d recommend a Dell XPS 15 2-in-1 and the new Windows 10 to anyone who needs to get serious work done (before you kick back on your couch with your favourite Netflix show.)

Maryellen Rose George

Brother PT-P750W

It’s useful for office tasks as well as pragmatic labelling of equipment and storage – just don’t get too excited and label everything in sight!

Cathy Giles

Brother MFC-L8900CDW

The Brother MFC-L8900CDW is an absolute stand out. I struggle to fault it.

Luke Hill

MSI GT75 TITAN

I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?