|
-----BEGIN PGP SIGNED MESSAGE----- =========================================================================== A U S C E R T A L E R T AL-2001.14 -- AUSCERT ALERT New Worm - "CodeRedII" 6 August 2001 =========================================================================== PROBLEM: AusCERT is issuing this alert to warn members that a new worm has been released that exploits the same vulnerability as "Code Red". This worm exhibits different behaviour to the "Code Red" in that it does not launch a deliberate DDoS attack nor deface web pages, but will now install trojan binaries onto an infected system that may directly lead to administrative compromise. "CodeRedII" appears to use a different pattern of propagation. Instead of randomly trying to infect any site across the whole Internet, it will concentrate on spreading locally, and then move further afield when local systems are saturated. The worm has been observed to probe nearby systems with a probability of 50% for the same Class A subnet (255.0.0.0) 37.5% for the same Class B subnet (255.255.0.0) and 12.5% random. Additionally, this worm is reputed to use non-blocking I/O during the connection phase so should be able to eliminate unresponsive hosts more quickly than "Code Red" thus increasing the speed of propagation. It will also avoid scanning invalid IP addresses. This worm is able to detect its own presence on an exploited system using the identifier "CodeRedII" and will not reinfect already infected systems. It can, however, supplant infections of the original "Code Red" worm. "CodeRedII" targets the same recently patched vulnerability in the Microsoft Internet Information Server (IIS) Indexing Service DLL as for "Code Red". For more information about this vulnerability, refer to the details under the heading "PLATFORM" below. More information about "Code Red" may be found in the previous AusCERT alert: AL-2001.13 AUSCERT ALERT Potential Increase in "Code Red" Worm Activity ftp://ftp.auscert.org.au/pub/auscert/advisory/AL-2001.13 The "CodeRedII" worm attack sequence is similar to that of "Code Red", but with a differently crafted HTTP GET request (which can be identified on victim machines by the presence of the following string in IIS log files): GET/default.ida?XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX%u9090%u6858%ucbd3%u7801%u9090%u6858%ucb d3%u7801%u9090%u6858%ucbd3%u7801%u9090%u9090%u8190%u00c3%u0003%u8b00%u 531b%u53ff%u0078%u0000%u00=a The worm will still attempt to exploit irrespective of whether the intended victim is actually vulnerable or not. As a result, the worm may have a denial-of-service effect on sites targeted during an outbreak. Once a host is infected with "CodeRedII", the behaviour diverges from that of the earlier "Code Red" worm. It checks whether Chinese (either Traditional or Simplified) is the language installed on the system. If so, it creates 600 threads and spreads for 48 hours before rebooting the system. On a non-Chinese system it creates 300 threads and spreads for 24 hours before reboot. This worm also attempts to create a backdoor by copying: %windir%\CMD.EXE to: c:\inetpub\scripts\root.exe c:\progra~1\common~1\system\MSADC\root.exe d:\inetpub\scripts\root.exe d:\progra~1\common~1\system\MSADC\root.exe It will also attempt to create trojan-horse versions of the files: c:\explorer.exe d:\explorer.exe to exploit a previously patched Microsoft vulnerability that allows the system to load the first explorer.exe accessed in the directory structure. This vulnerability was documented in the AusCERT External Security Bulletin: ESB-2000.189 Microsoft Security Bulletin (MS00-052) Patch Available for "Relative Shell Path" Vulnerability ftp://ftp.auscert.org.au/pub/auscert/ESB/ESB-2000.189 When the system is first rebooted by the worm, the trojan-horse version of explorer.exe, on vulnerable systems, will be executed instead of %windir%\explorer.exe. The trojan adds the value SFCDisable to: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon and adds keys under: SYSTEM\CurrentControlSet\Services\W3SVC\Parameters\Virtual Roots It then goes to sleep and modifies the registry keys every 10 minutes. In this state, the system is now vulnerable to remote administrative compromise. PLATFORM: "CodeRedII" exploits the same vulnerability as exploited by "Code Red", so the following information from the previous AusCERT Alert is likely to remain valid. The Microsoft systems that are affected by "Code Red" are: * Microsoft Windows NT 4.0 with IIS 4.0 or IIS 5.0 enabled and Index Server 2.0 installed; and * Windows 2000 with IIS 4.0 or IIS 5.0 enabled and Indexing services installed For further details refer to the AusCERT External Security Bulletins: ESB-2001.238 Microsoft Security Bulletin MS01-033 - Unchecked Buffer in Index Server ISAPI Extension Could Enable Web Server Compromise ftp://ftp.auscert.org.au/pub/auscert/ESB/ESB-2001.238 ESB-2001.241 CERT Advisory CA-2001-13 - Buffer Overflow In IIS Indexing Service DLL ftp://ftp.auscert.org.au/pub/auscert/ESB/ESB-2001.241 Cisco released an advisory warning of both a direct and indirect threat posed by "Code Red", to certain Cisco products. Due to its similarity to "Code Red", "CodeRedII" may also pose a threat to some Cisco products, but at this time no further statement has been made available by Cisco. From the Cisco Advisory for "Code Red": -------- Begin Extract -------- The following Cisco products are vulnerable because they run affected versions of Microsoft IIS: * Cisco CallManager * Cisco Unity Server * Cisco uOne * Cisco ICS7750 * Cisco Building Broadband Service Manager -------- End Extract -------- For further details refer to AusCERT External Security Bulletin: ESB-2001.304 Cisco Security Advisory "Code Red" Worm Customer Impact ftp://ftp.auscert.org.au/pub/auscert/ESB/ESB-2001.304 AusCERT has received reports from its constituency of Hewlett-Packard JetDirect print servers experiencing a denial of service when scanned by "Code Red" and so also may be affected by "CodeRedII". A JetDirect firmware fix may be available from Hewlett-Packard, please refer to the vendor. Additionally, at least one model of Hewlett-Packard network switch has been reported to crash on receipt of the "Code Red" worm. AusCERT advises that this information has not been endorsed by Hewlett-Packard so sites should conduct their own investigations into these issues. IMPACT: Infected systems may suffer a loss of integrity due to the addition of arbitrarily created executable files and may be vulnerable to further compromise due to the availability of a remotely accessible command-line shell. Additionally, performance degradation of networks may occur as a result of the propagating activity of this worm. This degradation may become quite severe, and potentially could cause some services to stop entirely. These impacts apply to both the Microsoft and Cisco products listed above. RECOMMENDATIONS: AusCERT stresses that this worm has the potential to adversely affect member sites, and we encourage system administrators to be alert for evidence of any activity on their systems that may indicate its presence. AusCERT is interested in any reports regarding this activity. If you have any information, comments or questions about this threat, please contact us. A. Detection 1) eEye Digital Security (http://www.eeye.com/) has recently released a free tool which you can use to scan your network for IIS servers which may still be vulnerable to the "Code Red" (and hence "CodeRedII") worm. You can download this tool from the eEye site directly at: http://www.eeye.com/html/Research/Tools/codered.html Please note that reference to this product does not imply endorsement. Members are cautioned to evaluate this product prior to use. 2) It is possible to check for evidence of an attempted attack by "CodeRedII". The crafted HTTP GET request used by the worm can be identified on victim machines by the presence of the following string in IIS log files: GET/default.ida?XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX%u9090%u6858%ucbd3%u7801%u9090%u6858%ucb d3%u7801%u9090%u6858%ucbd3%u7801%u9090%u9090%u8190%u00c3%u0003%u8b00%u 531b%u53ff%u0078%u0000%u00=a As mentioned previously, the worm will attempt to exploit irrespective of whether the intended victim is actually vulnerable or not. As a result, the worm may have a denial-of-service effect on sites targeted during an outbreak. B. Recovery and Prevention 1) Systems currently infected with the "CodeRedII" worm are likely to require reinstallation, due to the fact that remote administrative-level access may have been already gained to the system. 2) To protect your systems from re-infection install Microsoft's patch for the vulnerability that "CodeRedII" exploits: * Windows NT version 4.0: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=30833 * Windows 2000 Professional, Server and Advanced Server: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=30800 Useful step-by-step instructions for patch application are posted at: http://www.digitalisland.com/codered/ Again, please note that reference to this web site does not imply endorsement. Members are cautioned to evaluate this information prior to use. 3) Sites may wish to protect vulnerable hosts or printers with firewall rules that prevent access to port 80 from IP addresses outside of their network. If you detect that your system is already compromised, then you may need to instigate a full recovery procedure. You should keep in mind that if a machine is compromised, anything on that system could have been modified, including the kernel, binaries, datafiles, running processes, and memory. In general, the only way to trust that a machine is free from backdoors and intruder modifications is to reinstall the operating system from the distribution media and install all of the security patches before connecting back to the network. Merely determining and fixing the vulnerability that was used to initially compromise this machine may not be enough. We encourage you to restore your system using known clean binaries. In order to put the machine into a known state, you should re-install the operating system using the original distribution media. You should also ensure that you have applied all relevant security fixes and patched all application software according to the latest vendor information. If you suspect that your site may have been compromised, there are several documents available from: http://www.auscert.org.au/Information/Auscert_info/papers.html eg. Windows NT Intruder Detection Checklist Steps for Recovering from a UNIX or NT System Compromise which may provide some assistance. CERT/CC have also issued three Advisories on "Code Red" (CA-2001-19 and CA-2001-23) that have been redistributed as AusCERT External Security Bulletins: ESB-2001.302 CERT Advisory CA-2001-19 - "Code Red" Worm Exploiting Buffer Overflow In IIS ftp://ftp.auscert.org.au/pub/auscert/ESB/ESB-2001.302 ESB-2001.322 - CERT Advisory CA-2001-23 - Continued Threat of the "Code Red" Worm ftp://ftp.auscert.org.au/pub/auscert/ESB/ESB-2001.322 ESB-2001.323 - CERT Advisory - Public Alert about the Code Red worm ftp://ftp.auscert.org.au/pub/auscert/ESB/ESB-2001.323 - ---------------------------------------------------------------------------- The AusCERT team has made every effort to ensure that the information contained in this document is accurate at the time of publication. However, the decision to use the information described is the responsibility of each user or organisation. The appropriateness of this document for an organisation or individual system should be considered before application in conjunction with local policies and procedures. AusCERT takes no responsibility for the consequences of applying the contents of this document. If you believe that your system has been compromised, contact AusCERT or your representative in FIRST (Forum of Incident Response and Security Teams). AusCERT maintains an anonymous FTP service which is found on: ftp://ftp.auscert.org.au/pub/. This archive contains past SERT and AusCERT Advisories, and other computer security information. AusCERT maintains a World Wide Web service which is found on: http://www.auscert.org.au/. Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for emergencies. Postal: Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 AUSTRALIA =========================================================================== -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key iQCVAwUBO2/Opih9+71yA2DNAQF6wQP9GjPGFJBPADdpl+3PVs9AuhD1XCCLPEGy mabvufP1/Db+Nq5XAc6/AGqf3rurLO/DeESOIehf2yiWgwEEtRL4vPNhH2376+po f1plVJV+NldvaILj6KowlDg9acSbkI/Zk3lu9gCTgA+rqnKPyEcCsf2W36YBlPtO Zd6W0D+NJzM= =9rSu -----END PGP SIGNATURE-----