1. IIS 4.0 Web Defacement
MyCERT has learned of most common IIS 4.0 Web defacement. The exploit is via the unpatched MDAC MS Data Access Components which are commonly installed by default. This exploit can be conducted despite having firewall installed since it is via tcp port 80, which is often than not opened for web access.
Microsoft Data Access Components (MDAC) is a package used to integrate web and ODBC Data Access services. It includes a component named Remote Data Services (RDS). RDS allows remote access via the internet to database objects through IIS. Both are included in a default installation of the Windows NT 4.0 Option Pack. This is an old exploit discussed as early as April 22, 1998 as shown in CERT/CC Incident Notes which provides links to:
To detect such attacks log reviewing is necessary. For IIS 4.0, the logs can be retrieved at the following directory:
The sign of the intrusion will be similar to the following:
Users of IIS 4.0 are urged to remove the services if not required, or patch. More information on how to secure or disable the MDAC service is available at:
Enhance the security of your NT server. Please refer to these links for guidelines:
2. Multiple Linux platform exploit
We have also seen growing numbers of three similar exploits on multiple Linux platform, which are via the wu-ftpd remote format string stack overwrite vulnerability, multiple linux vendor rpc_statd remote format string vulnerability and multiple server LPRng user-supplied format string vulnerability. The vulnerabilities allow a remote user to gain root access to the server merely via anonymous FTP.
Those supporting multiple Linux platform are advised to refer to the following advisories on upgrades and configuration fixes.
-
Wu-Ftpd Remote Format String Stack Overwrite Vulnerability
http://www.cert.org/advisories/CA-2000-13.html
-
Multiple Linux Vendor rpc_statd Remote Format String Vulnerability
http://www.cert.org/advisories/CA-2000-17.html
-
Multiple Server LPRng User-Supplied Format String Vulnerability
http://www.cert.org/advisories/CA-2000-17.html
3. W32/Hybris and MTX Worm
MyCERT has received continuous reports of virus Hybris Worm and MTX worm, which upon execution, it sends a copy of itself as an email file attachment. Some of the reports indicated degradation in their network performance.
For information on how to prevent or recover from W32/Hybris and MTX worm infection, please see:
CERT Incident Note Open mail relays used to deliver "Hybris Worm"
http://www.cert.org/incident_notes/IN-2001-02.html
MA-023.102000 : MTX Worm
http://www.mycert.mimos.my/virus-info/mtx.htm
More information on the above Viruses from the respective vendors are available at the following link:
http://www.mycert.mimos.my/anti-virus.htm
End users are advised to practice safe email use and to configure the outlook express to prevent from becoming worm handlers. More information is available in the following FAQ
http://www.mycert.mimos.my/faq-safe_email_practices.htm