237 lines
11 KiB
Plaintext
237 lines
11 KiB
Plaintext
**********************************************************************
|
||
|
||
DDN Security Bulletin 03 DCA DDN Defense Communications System
|
||
18 Oct 89 Published by: DDN Security Coordination Center
|
||
(SCC@NIC.DDN.MIL) (800) 235-3155
|
||
|
||
DEFENSE DATA NETWORK
|
||
SECURITY BULLETIN
|
||
|
||
The DDN SECURITY BULLETIN is distributed by the DDN SCC (Security
|
||
Coordination Center) under DCA contract as a means of communicating
|
||
information on network and host security exposures, fixes, & concerns
|
||
to security & management personnel at DDN facilities. Back issues may
|
||
be obtained via FTP (or Kermit) from NIC.DDN.MIL [26.0.0.73 or
|
||
10.0.0.51] using login="anonymous" and password="guest". The bulletin
|
||
pathname is SCC:DDN-SECURITY-nn (where "nn" is the bulletin number).
|
||
|
||
**********************************************************************
|
||
|
||
W.COM ("WANK") WORM ON SPAN NETWORK
|
||
|
||
On 16 October, the CERT received word from SPAN network control that a
|
||
worm was attacking SPAN VAX/VMS systems. This worm affects only DEC
|
||
VMS systems and is propagated via DECnet (not TCP/IP) protocols.
|
||
At least two versions of this worm exist and more may be created.
|
||
Non-VMS systems are immune; TCP/IP networks are not at risk.
|
||
|
||
While this program is very similar to last year's HI.COM (or "Father
|
||
Christmas") worm (see DDN MGT Bulletin #50 23 Dec 88), THIS IS NOT A
|
||
PRANK. Instead of a "cute" Christmas greeting, W.COM appends code to
|
||
.com files and displays this banner:
|
||
|
||
W O R M S A G A I N S T N U C L E A R K I L L E R S
|
||
_______________________________________________________________
|
||
\__ ____________ _____ ________ ____ ____ __ _____/
|
||
\ \ \ /\ / / / /\ \ | \ \ | | | | / / /
|
||
\ \ \ / \ / / / /__\ \ | |\ \ | | | |/ / /
|
||
\ \ \/ /\ \/ / / ______ \ | | \ \| | | |\ \ /
|
||
\_\ /__\ /____/ /______\ \____| |__\ | |____| |_\ \_/
|
||
\___________________________________________________/
|
||
\ /
|
||
\ Your System Has Been Officically WANKed /
|
||
\_____________________________________________/
|
||
|
||
You talk of times of peace for all, and then prepare for war.
|
||
|
||
Initial reports described the worm as destructive, i.e. it would erase
|
||
files. Detailed analysis by the CERT, Lawrence Livermore National
|
||
Laboratory, and FermiLab has not found any code that would perform
|
||
file erasures. However, files are altered and new accounts created.
|
||
Serious security holes are left open by this worm.
|
||
|
||
It is very important to understand that someone in the future could
|
||
launch this worm on any DECnet based network. Many copies of the
|
||
virus have been mailed around. Anyone running a DECnet network should
|
||
be warned.
|
||
|
||
When the DDN PMO received these initial reports, the MailBridge
|
||
filters were activated to preclude any traffic from passing between
|
||
MILNET and the rest of the Internet. The filters will be turned off
|
||
(restoring full interoperability) Tuesday 17 October 1989 NLT 17:00
|
||
EDT. (NOTE: W.COM could traverse the MILNET only if encapsulated in
|
||
a TCP/IP "envelope", i.e. "assisted" by a human agent, and cannot
|
||
"infect" the MILNET.)
|
||
|
||
R. Kevin Oberman from Lawrence Livermore National Laboratory reports:
|
||
|
||
"This is a mean bug to kill and could have done a lot of damage.
|
||
Since it notifies (by mail) someone of each successful penetration
|
||
and leaves a trapdoor (the FIELD account), just killing the bug is
|
||
not adequate. You must go in an make sure all accounts have
|
||
passwords and that the passwords are not the same as the account
|
||
name."
|
||
|
||
The CERT also suggests checking every .com file on the system. The
|
||
worm appends code to .com files which will reopen a security hole
|
||
every time the program is executed.
|
||
|
||
An analysis of the worm (provided by R. Kevin Oberman and used with
|
||
his permission) appears below. Included with the analysis is a DCL
|
||
program that will block the current version of the worm. This program
|
||
should provide enough time to close up obvious security holes.
|
||
|
||
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||
|
||
Date: Mon, 16 Oct 89 15:30 PDT
|
||
From: "Kevin Oberman, LLNL, (415)422-6955" <OBERMAN@icdc.llnl.gov>
|
||
Subject: Report on network worm ***URGENT***
|
||
|
||
|
||
|
||
Report on the W.COM worm.
|
||
R. Kevin Oberman
|
||
Engineering Department
|
||
Lawrence Livermore National Laboratory
|
||
October 16, 1989
|
||
|
||
The following describes the action of the W.COM worm (currently based on the
|
||
examination of the first two incarnations). The replication technique causes
|
||
the code to be modified slightly which indicates the source of the attack and
|
||
learned information.
|
||
|
||
All analysis was done with more haste than I care for, but I believe I have all
|
||
of the basic facts correct.
|
||
|
||
First a description of the program:
|
||
|
||
1. The program assures that it is working in a directory to which the owner
|
||
(itself) has full access (Read, Write,Execute, and Delete).
|
||
|
||
2. The program checks to see if another copy is still running. It looks for a
|
||
process with the first 5 characters of "NETW_". If such is found, it deletes
|
||
itself (the file) and stops its process.
|
||
|
||
NOTE
|
||
A quick check for infection is to look for a process name starting with
|
||
"NETW_". This may be done with a SHOW PROCESS command.
|
||
|
||
3. The program then changes the default DECNET account password to a random
|
||
string of at least 12 characters.
|
||
|
||
4. Information on the password used to access the system is mailed to the user
|
||
GEMTOP on SPAN node 6.59. Some versions may have a different address.
|
||
|
||
5. The process changes its name to "NETW_" followed by a random number.
|
||
|
||
6. It then checks to see if it has SYSNAM priv. If so, it defines the system
|
||
announcement message to be the banner in the program:
|
||
W O R M S A G A I N S T N U C L E A R K I L L E R S
|
||
_______________________________________________________________
|
||
\__ ____________ _____ ________ ____ ____ __ _____/
|
||
\ \ \ /\ / / / /\ \ | \ \ | | | | / / /
|
||
\ \ \ / \ / / / /__\ \ | |\ \ | | | |/ / /
|
||
\ \ \/ /\ \/ / / ______ \ | | \ \| | | |\ \ /
|
||
\_\ /__\ /____/ /______\ \____| |__\ | |____| |_\ \_/
|
||
\___________________________________________________/
|
||
\ /
|
||
\ Your System Has Been Officically WANKed /
|
||
\_____________________________________________/
|
||
|
||
You talk of times of peace for all, and then prepare for war.
|
||
|
||
7. If it has SYSPRV, it disables mail to the SYSTEM account.
|
||
|
||
8. If it has SYSPRV, it modifies the system login command procedure to
|
||
APPEAR to delete all of a user's file. (It really does nothing.)
|
||
|
||
9. The program then scans the accounts logical name table for command
|
||
procedures and tries to modify the FIELD account to a known password
|
||
with login from any source and all privs. This is a primitive virus,
|
||
but very effective IF it should get into a privileged account.
|
||
|
||
10. It proceeds to attempt to access other systems by picking node numbers at
|
||
random. It then used PHONE to get a list of active users on the remote system.
|
||
It proceeds to irritate them by using PHONE to ring them.
|
||
|
||
11. The program then tries to access the RIGHTSLIST file and attempts
|
||
to access some remote system using the users found and a list of
|
||
"standard" users included with the worm. It looks for passwords
|
||
which are the same as that of the account or are blank. It records all
|
||
such accounts.
|
||
|
||
12. It looks for an account that has access to SYSUAF.DAT.
|
||
|
||
13. If a priv. account is found, the program is copied to that account and
|
||
started. If no priv account was found, it is copied to other accounts found on
|
||
the random system.
|
||
|
||
14. As soon as it finishes with a system, it picks another random system and
|
||
repeats (forever).
|
||
|
||
Response:
|
||
|
||
1. The following program will block the worm. Extract the following code
|
||
and execute it. It will use minimal resources. It create a process named
|
||
NETW_BLOCK which will prevent the worm from running.
|
||
-------
|
||
Editors note: This fix will work only with this version of the worm.
|
||
Mutated worms will require modification of this code; however, this
|
||
program should prevent the worm from running long enough to secure
|
||
your system from the worms attacks.
|
||
-------
|
||
==============================================================================
|
||
$ Set Default SYS$MANAGER
|
||
$ Create BLOCK_WORM.COM
|
||
$ DECK/DOLLAR=END_BLOCK
|
||
$LOOP:
|
||
$ Set Process/Name=NETW_BLOCK
|
||
$ Wait 12:0
|
||
$ GoTo loop
|
||
END_BLOCK
|
||
$ Run/Input=SYS$MANAGER:BLOCK_WORM.COM/Error=NL:/Output=NL:/UIC=[1,4] -
|
||
SYS$SYSTEM:LOGINOUT
|
||
==============================================================================
|
||
|
||
2. Enable security auditing. The following command turns on the MINIMUM
|
||
alarms. The log is very useful in detecting the effects of the virus left by
|
||
the worm. It will catch the viruses modification of the UAF.
|
||
$ Set Audit/Alarm/Enable=(ACL,Authorization,Breakin=All,Logfailure=All)
|
||
|
||
3. Check for any account with NETWORK access available for blank passwords or
|
||
passwords that are the same as the username. Change them!
|
||
|
||
4. If you are running VMS V5.x, get a copy of SYS$UPDATE:NETCONFIG_UPDATE.COM
|
||
from any V5.2 system and run it. If you are running V4.x, change the username
|
||
and password for the network object "FAL".
|
||
|
||
5. If you have been infected, it will be VERY obvious. Start checking the
|
||
system for modifications to the FIELD account. Also, start scanning the system
|
||
for the virus. Any file modified will contain the following line:
|
||
$ oldsyso=f$trnlnm("SYS$OUTPUT")
|
||
It may be in LOTS of command procedures. Until all copies of the virus are
|
||
eliminated, the FIELD account may be changed again.
|
||
|
||
6. Once you are sure all of the holes are plugged, you might kill off
|
||
NETW_BLOCK. (And then again, maybe not.)
|
||
|
||
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||
|
||
If you have any technical questions or have an infected system, please
|
||
call the CERT:
|
||
|
||
Computer Emergency Response Team
|
||
Email: cert@sei.cmu.edu
|
||
Telephone: 412-268-7090 (answers 24 hours a day)
|
||
|
||
|
||
If you have any general questions, please call the SCC:
|
||
|
||
Security Coordination Center
|
||
Email: scc@nic.ddn.mil
|
||
Telephone: 1-800-235-3155 or 415-859-3695 (7 a.m. to 5 p.m. Pacific time).
|
||
|
||
**********************************************************************
|
||
|