[Techtalk] "Slapper" worm targeting Linux/Apache servers

Raven Brooke linuxchiq at linuxchiq.com
Fri Sep 20 11:39:28 EST 2002



***IMPORTANT note regarding this patch:

A *reboot* is required in order for this patch to work. Having just 
rebuilt a server that was infected by slapper after the patch was applied 
but the box not rebooted, I can testify that this is indeed the case.

Cheers,

Raven

On Fri, 20 Sep 2002, Grrliegeek wrote:

> I hadn't seen this mentioned yet on either list I'm posting it to. This is 
> going to techtalk and the Austin Linux Group. There is a worm going around 
> that's targeting apache servers using a vulnerability discovered in July 
> (which I think was patched and a new version of apache that is not vulnerable 
> is out there).
> 
> In a thread on linuxchix about security and why it's not always as up to date 
> as ideal, someone mentioned that they hadn't patched their (apache?) server 
> because they had other things they wanted to accomplish with the server 
> first. I think that due to the widespread nature of this worm, making sure 
> apache is up to snuff is of importance.
> 
> For more information:
> http://www.msnbc.com/news/808678.asp?0dm=C16KT
> http://online.securityfocus.com/news/662
> 
> >From the latter url, story dated 9/16/02:
> Slapper exploits a previously-disclosed OpenSSL vulnerability, to create an 
> attack platform for distributed denial-of-service (DDoS) attacks against 
> other sites. The worm also has backdoor functionality, according to, security 
> tools vendor ISS. It describes the malicious code as a variation of the much 
> less virulent Apache "Scalper" BSD worm.
> 
> The OpenSSL server vulnerability exploit exists on a wide variety of 
> platforms, but Slapper appears to work only on Linux systems running Apache 
> with the OpenSSL module (mod_ssl) on Intel architectures.
> 
> The Slapper worm was first seen on Friday the 13th. Since then it has infected 
> thousands of web servers around the world and continues to spread. By late 
> last night 6,000 servers were infected with the worm, according to AV vendors 
> F-Secure. 
> 
> Syleniel
> _______________________________________________
> Techtalk mailing list
> Techtalk at linuxchix.org
> http://mailman.linuxchix.org/mailman/listinfo/techtalk
> 

-- 
SELECT * FROM users WHERE clue > 0
0 rows returned.




More information about the Techtalk mailing list