CERT warns of attacks, new holes in Windows

The CERT Coordination Center has received reports of widespread attacks using a recently disclosed security vulnerability and a previously unknown security hole in Microsoft's Windows operating system, the center said last Thursday in an advisory.

The known vulnerability is in a Windows interface that handles communications using the RPC (Remote Procedure Call) protocol. That problem affects most supported versions of the Windows operating system and could enable remote attackers to gain total control over vulnerable systems.

Microsoft disclosed the problem and provided a patch for vulnerable systems in a security bulletin July 16 after it was discovered and reported to the company by a Polish security group, Last Stage of Delirium.

Reports of Internet scans for vulnerable systems and isolated attacks using the Windows flaw surfaced after the publication on the Internet last week of code that could be used to exploit vulnerable systems, prompting warnings from security experts and the U.S. Department of Homeland Security about pending attacks.

CERT's advisory cites the existence of multiple exploits on the Internet and reports of "intruders actively scanning for and exploiting" the Microsoft vulnerability.

In the past two days, the computer security research and development organization has received reports of "thousands" of systems compromised using variations of the malicious code, known as DCOM RPC, after the flawed Windows DCOM (distributed component object model) interface, according to Jeff Havrilla, Internet security analyst at CERT in Pittsburgh.

CERT does not know how many machines have been hacked using the DCOM RPC exploit, but the ratio between the number of reports CERT typically receives to the number of machines compromised suggests that the number is large, Havrilla said.

In many cases, administrators may not even know their computers have been compromised, he said. That may be by design.

In contrast to previous exploits such as the Code Red and Slammer worms, both of which took advantage of widespread Microsoft security holes, malicious hackers are keeping a low profile with the DCOM RPC vulnerability, Havrilla said.

"It's not like Code Red where the machine that was taken over started to spawn hundreds of processes. These machines are much more stealthy and much more controlled," he said.

Malicious hackers are using DCOM RPC to place Trojan programs on compromised systems, giving them control of those systems for use in future attacks, he said.

"It's not a worm. It doesn't rise to that level. But it's a controlled, systematic exploitation of vulnerable systems," Havrilla said.

Also adding to volume of attacks is a previously unknown flaw, also in the Windows RPC component but not covered by the recent Microsoft patch, that makes Windows 2000 machines vulnerable to denial of service attacks, he said.

That flaw surfaced in recent days, along with code to exploit the vulnerability, and has also been used in attacks on vulnerable systems. Those attacks have caused confusion among Microsoft customers who applied the RPC patch to Windows 2000 systems, fueling speculation that the Redmond, Washington, company's patch did not work.

In its advisory, CERT recommends that customers apply both the Microsoft patch and block network traffic on Transmission Control Protocol (TCP) ports 135, 139 and 445, which are used by the RPC service.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Paul Roberts

IDG News Service
Show Comments

Brand Post

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Maryellen Rose George

Brother PT-P750W

It’s useful for office tasks as well as pragmatic labelling of equipment and storage – just don’t get too excited and label everything in sight!

Cathy Giles

Brother MFC-L8900CDW

The Brother MFC-L8900CDW is an absolute stand out. I struggle to fault it.

Luke Hill

MSI GT75 TITAN

I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Laura Johnston

MSI GS65 Stealth Thin

If you can afford the price tag, it is well worth the money. It out performs any other laptop I have tried for gaming, and the transportable design and incredible display also make it ideal for work.

Andrew Teoh

Brother MFC-L9570CDW Multifunction Printer

Touch screen visibility and operation was great and easy to navigate. Each menu and sub-menu was in an understandable order and category

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?