"Juergen Nieveler" <
[email protected]> schreef in
bericht
It exploits the RPC DCOM process.. and as stated, it catches you!
To be more precise, it works like this:
1) The attacking machine sends a packet to port 135/TCP on the
victims'
PC that crashes RPC through a buffer overflow[0] that leads to a
special piece of code being executed on the victim's machine.
2) Said code will open a command shell accessible via port 4444/TCP
3) The attacking PC will send a sequence of commands to the victim:
3.1) Download msblast.exe from $attacker with TFTP and save it in
%systemdir%
3.2) Launch msblast.exe
4) msblast.exe will launch a TFTP server on the victim machine and
start sending exploit packets to random targets.
After that, everything starts over, until the built-in payload
activates itself to flood the MS server.
[0] 80% of the time this packet is designed to take out XP, 20% of
the
time Win2k, according to Symantec.
So there is no concern for windows 98 (SE)?
I saw one reference to w95/98/ME on a symantec page about blaster, but I
think this must have been a typo: only NT based versions of Windows
(NT/2000/XP) have services, so there would be no RPC to expoit.
So does this mean that those OS versions are immune to the exploit
even if the services were added on as an aftermarket enhancement?
I'm not clear on the details, but it's no enhancement: rather an integral
part of how the OS works. NT is Unix based rather than DOS based, and I
think services are a key part of this. It's how NT manages to survive a
crash: everything is separated into independent modules. Services are
modules that control different aspects of the OS. Though they're
interdependent, they can to a certain extent be turned on and off
independently. If the worm-writer had wanted to affect the DOS based
versions of Windows (s)he would have had to find a comparable component to
exploit - presumably the malformed connection string msblaster uses has no
effect on those OS versions. Anyone know for sure?