That OpenSSL Worm
On Friday September 13th the first reports appeared on Bugtraq of an active worm exploiting the OpenSSL buffer overflow vulnerability reported at the end of July. The next day CERT issued Advisory CA-2002-27 Apache/mod_ssl Worm.
By Sunday
September 15th, at 17:00 GMT, F-Secure Corporation reported 13,000 infected servers
out of "over 1,000,000 active OpenSSL
installations in the public web.
"
Updates to fix the problem, including backports to earlier versions of OpenSSL, had been available for over a month
from the OpenSSL project, Caldera, Conectiva, Debian, EnGarde, Eridani, Gentoo, Mandrake, OpenPKG, Red Hat, SuSE, Trustix and Yellow Dog.
SecurityFocus has completed and released a full analysis (PDF format) of the worm in addition to their initial incident Alert (PDF format). F-Secure is maintaining a "Virus Description" of this worm with lots of interesting information.
The first reports in the press appeared Friday, the day the worm was first seen, in CNET and Network World Fusion. The next day CNET put up another story with additional information. By Monday evening both the Register and TechWeb had published their reports on events to date. On Tuesday Network World Fusion reported that the worm has infected at least 30,000 Linux Apache Web servers.
Also, see this other article from TechWeb on the worm:
RUS-CERT has made available a tool to remotely detect vulnerable servers. However, Eric Rescorla has observed behavior different from what that tool expects.
In the unlikely event that you haven't already, applying the appropriate OpenSSL update might be a very good thing to do before reading any further.
Posted Sep 19, 2002 8:29 UTC (Thu)
by beejaybee (guest, #1581)
[Link]
Except you've probably already been hit :( Please don't be suckered into the delusion that applying the patch will cure an already-infected system. This incident brings into sharp relief the necessity of staying on top of the (unfortunately, endless) job of keeping your systems patched.
Posted Sep 20, 2002 13:39 UTC (Fri)
by nas (subscriber, #17)
[Link] (1 responses)
I'm not saying Unix is not vulnerable to the same types of security problems as Windows. Unix servers need compliant people to maintain them.
Posted Sep 21, 2002 11:10 UTC (Sat)
by ion++ (guest, #2433)
[Link]
JonB
"In the unlikely event that you haven't already, applying the appropriate OpenSSL update might be a very good thing to do before reading any further."That OpenSSL Worm
I think the press is slightly exaggerating the spread of this worm. Read
the story and it sounds like a Unix version of Code Red. When Code Red was
in full force I saw tons of bogus requests in our server's access logs.
When I heard about the OpenSSL worm I immediately setup an iptables logging rule on one of our machines to watch for it. I haven't seen a single packet
on UDP port 2002.
How widespread, really?
Not only Unix servers need compliant people to maintain them. All computers needs complaint and competent people to maintain them, it doesnt matter what kind of computer it is.How widespread, really?