• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

More on vulnerabilities in W2k and XP

Medea

Golden Member
CERT Advisory CA-2003-08 Increased Activity Targeting Windows Shares

Original release date: March 11, 2003
Source: CERT/CC

A complete revision history can be found at the end of this file.

Systems Affected

* Microsoft Windows 2000
* Microsoft Windows XP

Overview

In recent weeks, the CERT/CC has observed an increase in the number of reports of systems running Windows 2000 and XP compromised due to poorly protected file shares.

I. Description

Over the past few weeks, the CERT/CC has received an increasing number of reports of intruder activity involving the exploitation of Null
(i.e., non-existent) or weak Administrator passwords on Server Message Block (SMB) file shares used on systems running Windows 2000 or Windows XP. This activity has resulted in the successful compromise of thousands of systems, with home broadband users' systems being a prime target. Recent examples of such activity are the attack tools known as W32/Deloder, GT-bot, sdbot, and W32/Slackor, which are described in more detail below.

Background

Microsoft Windows uses the SMB protocol to share files and printer resources with other computers. In older versions of Windows (e.g.,
95, 98, Me, and NT), SMB shares ran on NetBIOS over TCP/IP (NBT) on ports 137/tcp and udp, 138/udp, and 139/tcp. However, in later versions of Windows (e.g., 2000 and XP), it is possible to run SMB directly over TCP/IP on port 445/tcp.

Windows file shares with poorly chosen or Null passwords have been a recurring security risk for both corporate networks and home users for some time:
* IN-2002-06: W32/Lioten Malicious Code
* CA-2001-20: Continuing Threats to Home Users
* IN-2000-02: Exploitation of Unprotected Windows Networking Shares
* IN-2000-03: 911 Worm

It has often been the case that these poorly configured shares were exposed to the Internet. Intruders have been able to leverage poorly protected Windows shares by exploiting weak or Null passwords to access user-created and default administrative shares. This problem is exacerbated by another relevant trend: intruders specifically targeting Internet address ranges known to contain a high density of weakly protected systems. As described in CA-2001-20, the intruders' efforts commonly focus on addresses known to be used by home broadband connections.

Recent developments

The CERT/CC has recently received a number of reports of exploitation of Null or weak Administrator passwords on systems running Windows 2000 or Windows XP. Thousands of systems have been compromised in this manner.

Although the tools involved in these reports vary, they exhibit a number of common traits, including
* scanning for systems listening on 445/tcp (frequently within the same /16 network as the infected host)
* exploiting Null or weak passwords to gain access to the Administrator account
* opening backdoors for remote access
* connecting back to Internet Relay Chat (IRC) servers to await additional commands from attackers
* installing or supporting tools for use in distributed denial-of-service (DDoS) attacks

--------------------------

Full article at:
CERT Advisory CA-2003-08
 
The title is misleading, this isn't a vulnerability in the sense that it's a bug that needs to be patched for. These are end user running file shares on the open internet with no or bad passwords.
Bill
 
Originally posted by: Walleye
this is only a vulnerability to file shares?
i use a firewall, how is that? a hardware firewall?

If you allow remote file sharing your vulnerable, if you haven't opened that up on your fw it will protect you.
Bill


 
Figures, shortly after the nimda/code-red attempts in my apache logs die down my pf logs are filled with port 445 connection attempts...
 
It's a sign of the times.
As more people start using these "more secure" OS's there are going to be people out there looking for bad or missing passwords.
Just because an OS is inherantly more secure, as in the case of 2K Pro and XP Pro, doesn't mean the user/admin has hardened it correctly.
If you put weak or no passwords on Linux box it will get compromised eventually.
 
It's probably the user's fault with bad or null passwords.

That doesn't make it any less annoying.

If you put weak or no passwords on Linux box it will get compromised eventually.

A big difference though is that by default root can't login remotely, so they need to guess/acquire a username too.
 
Back
Top