Site icon IT World Canada

FBI, CERT and others warn of Code Red reawakening

Bracing for the reawakening of Code Red, a malicious Internet worm, a number of U.S. government and private organizations on Saturday called on Web server administrators to ensure that their server software is up to date.

Describing the worm as “a real and present threat to the Internet,” the organizations said in an unprecedented joined alert that Code Red is likely to start spreading again at 8 p.m. EDT Tuesday and that it has mutated so that it “may be even more dangerous.” All of the data packets that Code Red generates can clog data pipelines and slow the Internet, disrupting business. Code Red first wreaked havoc on July 19.

The U.S Federal Bureau of Investigation’s National Infrastructure Protection Center, the Computer Emergency Response Team (CERT Coordination Center), the Federal Computer Incident Response Center (FedCIRC), the Information Technology Association of America (ITAA), the SANS Institute and Microsoft Corp. are among the issuers of the alert.

A new break out of Code Red is feared because the worm operates on a time clock. The first 19 days of a month the worm is set up to scan and infect, but from day 20 until day 27 the worm floods a certain IP (Internet Protocol) address – in this case the White House Web server – with information requests causing a denial of service attack. The Web server has since been given a new IP address.

Code Red is a self-propagating worm. It scans the Internet for vulnerable systems and infects these systems by installing itself. Once it has nestled itself on a server, it uses that server to scan the Internet for other vulnerable servers and infects those. Web pages on compromised servers are altered. In the first nine hours of its outbreak on July 19 Code Red infected more than 250,000 systems, according to the CERT [see story –

New variant of Code Red worm found

].

The worm targets servers running Microsoft’s Internet Information Server (IIS) software versions 4.0 and 5.0. It exploits a buffer overflow vulnerability in the Indexing Service DLL (Dynamic Runtime Library) of the Web server software. IIS is part of Windows NT and Windows 2000. A patch for the hole has been available since June 18.

The warning is warranted, according to Simon Leech, an Amsterdam-based security engineer for Network Associates Inc.

“When the worm was first discovered it infected servers for a couple days. Administrators had started patching servers, but may have stopped thinking the threat was gone,” he said. “We’ve got to make sure everybody applies the patch. We could be facing an Internet meltdown, depending on how many unpatched servers are out there. It’s going to come down to how many vigilant administrators are out there.”

More information on the IIS Indexing Service DLL flaw and the software fix are available on Microsoft’s TechNet Web site:

http://www.microsoft.com/technet/security/bulletin/MS01-033.asp

CERT, in Pittsburgh, can be contacted at

http://www.cert.org/

. The NIPC, in Washington, D.C., can be reached at

http://www.nipc.gov/

.

Exit mobile version