You are not logged in. Login Now
 0-24   25-49   50-62        
 
Author Message
25 new of 62 responses total.
pvn
response 25 of 62: Mark Unseen   Aug 3 05:23 UTC 2003

re#24:  Thats not a particularly helpful suggestion.  There are many
orgs where even if the individual wanted to replace M$ OS entirely the
org rules specify approved OS and that is M$.  And further, 'virtual' M$
OS would in this case be equally vulnerable to the exploit (I gather you
have not seen the exploit code) and whats worse, the ISS free tool for
scanning for vulnerable machines won't find it.  (I have personal
knowlege of this)

Word.  Folk, install the update before its too late.
russ
response 26 of 62: Mark Unseen   Aug 3 20:13 UTC 2003

Hmmm.  If you have the source to the worm it should be really easy
to hack it into a scanner for vulnerable machines, no?  It should
also be really easy to use that source to see what kinds of attack
packets the worm uses, and hack up some firewall software to drop
any coming from outside and ID any infected machines inside.
pvn
response 27 of 62: Mark Unseen   Aug 4 04:44 UTC 2003

re#26: Just like everybody else that bothered to look I had the dcom.c
to the initial exploit and did exactly as you describe.  I don't have
the source *yet* to the worm to do the same.  My point was that your
virtual windows scenario in fact prevented the ISS scanner from
functioning and things like ISS etc are what most orgs have to rely on.
Thus your suggestion to eliminate M$ OS may in fact be technically
correct, but meaningless as in the real world the environment in user
space is M$ OS and unfortunately to an increasing extent in server space
as well.

Install the Update before it is Too Late.
sj2
response 28 of 62: Mark Unseen   Aug 4 18:48 UTC 2003

Last year M$ released 70 patches. This year its been 30 and we're still 
counting.
pvn
response 29 of 62: Mark Unseen   Aug 5 05:45 UTC 2003

Look, there is no debate that M$ OS's suck.  Thats irrelevent.  Its what
you have to use on a PC.

Install the Update before it is Too Late.
sj2
response 30 of 62: Mark Unseen   Aug 5 05:53 UTC 2003

Re #29, True that you must patch it asap.

"Its what you have to use on a PC." - Increasingly becoming debatable.

novomit
response 31 of 62: Mark Unseen   Aug 5 11:27 UTC 2003

I use Linux or BSD on most of my PC's. I don't see where you "have" to use
MS unless your boss forces you to.
cross
response 32 of 62: Mark Unseen   Aug 5 13:16 UTC 2003

This response has been erased.

novomit
response 33 of 62: Mark Unseen   Aug 5 13:22 UTC 2003

yeah, I have that on the one Windows computer I use at work as well.
Fortunately my admins are Unix buffs, so they usually don't complain.
russ
response 34 of 62: Mark Unseen   Aug 5 22:06 UTC 2003

I wonder why an emulator would defeat the vulnerability scanner.  If
it makes that much of a difference, I wonder how much more of a tweak
it might take to make the emulator defeat the worm...

The point of running the M$ OS under emulation isn't to prevent infection,
it is to allow faster (perhaps automated) purging of this or any future
worm.  You KNOW that M$ code is crap, so you might as well take measures
to minimize your damages.

Is IBM still working on the "digital immune system" scheme?
pvn
response 35 of 62: Mark Unseen   Aug 6 06:02 UTC 2003

re#34: The vulnerability scanner attempts to detect the presence of the
vulnerability without subverting the machine and relies among other
things on the ability to detect the tcp stack implementation.  By
definintion, in order to emulate/interoperate the emulated Wintel would
be equally vulnerable to the DCOM/RPC exploit(s).  Thus the emulated and
vulnerable machine was even more of the threat since it was hidden.

From a pure tech play the emulated M$OS environment with an ids running
in the native OS is clearly superior.  Unfortunately its more expensive
and the emulation runs slower than the cheaper native system so its not
likely to be implemented.

---

Depending on the size of the organization there are simple support
issues with allowing anything other than a "standard" build of an OS to
run.  It is a management issue not a technical one.  And often there a
requirements such that an independent auditor be able to sign off on an
org's compliance with legal standards that they would obviously not be
willing to do so if the org's users all had "pink ones" - hand built
hardware/software systems.

From a technical perspective the geek users get this "approved build"
and notice many "flaws" - not realizing for example that downlevel code
in some area may be to allow a specific legacy application to function
that only a small number of critical users even know about and so
naturally "fixes" it, goes on his/her merry way, and lies to support if
there is ever an issue and has a generally poor opinion of the process
not having all the technical details.

An observation that even Russ probably hasn't noticed.  Often the
process of "installing an approved load" of an OS involves literally
cloning a clone of an approved and working "seed" machine rather than an
actual OS load of a distribution by its nature resulting in a fragmented
filesystem that degrades from there.  I have personally seen as high as
50% fragmentation and so often the first thing one can do to improve
things is to defragment your drive (this is Wintel specific advice
obviously).  There is a slight possibility it may break things but these
days not as likely - things tend to work better not worse if they work
faster.  Again, this tends to not exactly give the geekly a high opinion
of the process.  (Obviously the solution is to defragment the seed
machine before its "load" is approved and cloned - but the geeks
invariably are not inclined to share that information with those
building the approved machines.)

Install the Update before its Too Late.
gull
response 36 of 62: Mark Unseen   Aug 13 01:13 UTC 2003

A friend of mine had his XP Home system get hit by this worm last night.
 He ran Symantec's removal tool and then patched his system, and it's
stable again now.  The main symptom was that svchost.exe kept crashing
repeatedly, forcing reboots.

The patch has been out for almost a month, so there aren't many good
excuses for getting hit by this one.  Running Windows Update every
couple of weeks would have kept you safe.
pvn
response 37 of 62: Mark Unseen   Aug 13 07:18 UTC 2003

and mysteriously broken stuff from time to time - been there, got the
hat and the t-shirt.  Consider for a moment that you are trusting the
"automatic update" function to the same folk that brought you the shitty
OS in the first place.  Like Duh.  How stupid is that?
polytarp
response 38 of 62: Mark Unseen   Aug 13 07:50 UTC 2003

Fuck off, opium den.
gull
response 39 of 62: Mark Unseen   Aug 13 13:04 UTC 2003

I've actually only had one update that broke anything.  (Q328310 -- it
causes random BSODs on some NT 4.0 Workstation systems.)  Anyway, if
you'd rather get hit by a worm, be my guest. ;>
lynne
response 40 of 62: Mark Unseen   Aug 13 14:43 UTC 2003

...on the other hand, by *not* running windows update every couple of
weeks and keeping the WindowsMe, I'm not vulnerable to the worm. Spent
a fair amount of time looking for the patch before I figured that one
out.
scott
response 41 of 62: Mark Unseen   Aug 13 14:52 UTC 2003

(obligatory Linux zealot gloating)
novomit
response 42 of 62: Mark Unseen   Aug 13 15:25 UTC 2003

yeah, it doesnt affect us unix/linux users, right?
gelinas
response 43 of 62: Mark Unseen   Aug 13 16:28 UTC 2003

Nor even us Mac weenies. :)
mary
response 44 of 62: Mark Unseen   Aug 13 18:26 UTC 2003

Do you think there are enough of us weenies here,
on Grex, to support a Mac conference?
lynne
response 45 of 62: Mark Unseen   Aug 13 18:35 UTC 2003

<prepares for flame war born of endless PC/Mac conversions problems on
work demanded by boss>
gull
response 46 of 62: Mark Unseen   Aug 13 18:40 UTC 2003

Re #40: True, but I still recommend running Windows Update because there
are bugs in WiniME, too.  They just haven't been widely exploited yet.
gelinas
response 47 of 62: Mark Unseen   Aug 13 18:53 UTC 2003

I dunno, mary; right now, the micros conference is kinda dull.  We could start
a few items and see. :)
dcat
response 48 of 62: Mark Unseen   Aug 13 19:44 UTC 2003

Of course, I don't suppose it would help if people stopped using programs that
automatically open e-mail attachments, would it?  Nah, didn't think so.
gull
response 49 of 62: Mark Unseen   Aug 13 21:42 UTC 2003

In this case, it wouldn't have.  The current worm doesn't spread through
email, it scans for vulnerable machines and infects them directly.
 0-24   25-49   50-62        
Response Not Possible: You are Not Logged In
 

- Backtalk version 1.3.30 - Copyright 1996-2006, Jan Wolter and Steve Weiss