Re: MS SQL WORM IS DESTROYING INTERNET BLOCK PORT 1434!

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



In-Reply-To: <20030125021141.A23211@romulus.netgraft.com>

Michael,

You're correct. We started to get flooded at 03:00 AM
(now its 09:20 am down here), and found the solution
about 30 min after: shutting down all W2K SQLs. Now we
have all 1434 and 1433 blocked. 1433 seems to be
important too.

Please check this: 

http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS02-039.asp

We had troubble downloading the patch.. too busy. I got
it now, and made a mirror. Please feel free to get it
and patch your SQL 2k.

http://thor.stech.psi.br/ms-update/Q323875_SQL2000_SP2_en.EXE


Regards
Carlos Eduardo Vianna - cvianna@stech.net.br
SouthTech Internet DataCenter
http://www.stech.net.br/


>Received: (qmail 1867 invoked from network); 25 Jan
2003 08:39:23 -0000
>Received: from outgoing3.securityfocus.com
(205.206.231.27)
>  by mail.securityfocus.com with SMTP; 25 Jan 2003
08:39:23 -0000
>Received: from lists.securityfocus.com
(lists.securityfocus.com [205.206.231.19])
>	by outgoing3.securityfocus.com (Postfix) with QMQP
>	id A5DACA30A5; Sat, 25 Jan 2003 00:59:36 -0700 (MST)
>Mailing-List: contact bugtraq-help@securityfocus.com;
run by ezmlm
>Precedence: bulk
>List-Id: <bugtraq.list-id.securityfocus.com>
>List-Post: <mailto:bugtraq@securityfocus.com>
>List-Help: <mailto:bugtraq-help@securityfocus.com>
>List-Unsubscribe:
<mailto:bugtraq-unsubscribe@securityfocus.com>
>List-Subscribe:
<mailto:bugtraq-subscribe@securityfocus.com>
>Delivered-To: mailing list bugtraq@securityfocus.com
>Delivered-To: moderator for bugtraq@securityfocus.com
>Received: (qmail 28308 invoked from network); 25 Jan
2003 07:06:20 -0000
>Date: Sat, 25 Jan 2003 02:11:41 -0500
>From: Michael Bacarella <mbac@netgraft.com>
>To: nylug-talk@nylug.org, wwwac@lists.wwwac.org,
>	linux-elitists@zgp.org
>Subject: MS SQL WORM IS DESTROYING INTERNET BLOCK PORT
1434!
>Message-ID: <20030125021141.A23211@romulus.netgraft.com>
>Mime-Version: 1.0
>Content-Type: text/plain; charset=us-ascii
>Content-Disposition: inline
>User-Agent: Mutt/1.2.5i
>Resent-From: mbac@romulus.netgraft.com
>Resent-Date: Sat, 25 Jan 2003 02:12:54 -0500
>Resent-To: bugtraq@securityfocus.com
>Resent-Message-Id:
<20030125071254.1B3F7681AD@romulus.netgraft.com>
>
>I'm getting massive packet loss to various points on
the globe.
>I am seeing a lot of these in my tcpdump output on each
>host.
>
>02:06:31.017088 150.140.142.17.3047 >
24.193.37.212.ms-sql-m:  udp 376
>02:06:31.017244 24.193.37.212 > 150.140.142.17: icmp:
24.193.37.212 udp port ms-sql-m unreachable [tos 0xc0
>
>It looks like there's a worm affecting MS SQL Server
which is
>pingflooding addresses at some random sequence.
>
>All admins with access to routers should block port
1434 (ms-sql-m)!
>
>Everyone running MS SQL Server shut it the hell down
or make
>sure it can't access the internet proper!
>
>I make no guarantees that this information is correct,
test it
>out for yourself!
>
>-- 
>Michael Bacarella                  24/7 phone: 646
641-8662
>Netgraft Corporation                  
http://netgraft.com/
>      "unique technologies to empower your business"
>
>Finger email address for public key.  Key fingerprint:
>  C40C CB1E D2F6 7628 6308  F554 7A68 A5CF 0BD8 C055
>


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux