The security researchers at eEye Digital Security are not impressed with the Sasser worm
Published:
3 May 2004 y., Monday
The company, which found the flaws that were exploited by both the MSBlast worm and the Witty worm, on Saturday started analyzing the latest piece of attack code that takes advantage of a Microsoft Windows vulnerability discovered by its researchers. So far, eEye's analysts are surprised that the worm has spread so far.
The Sasser worm started spreading late Friday, and so far has not racked up the crowd of compromised computers that its predecessors have been able to claim. Such a limited spread could indicate that computer users are becoming more diligent about heeding warnings and patching their systems, but security researchers believe that the worm's poor programming has given network administrators a break.
"If this virus was better written, you would have seen more impact," said Alfred Huger, senior director of security firm Symantec's response center.
The Sasser worm spreads from infected computer to vulnerable computer with no user interaction required. The worm exploits a recent vulnerability in a component of Microsoft Windows known as the Local Security Authority Subsystem Service, or LSASS. After scanning for vulnerable Windows XP and Windows 2000 systems, the worm creates a remote connection to the system, installs a file transfer protocol (FTP) server and then downloads itself to the new host.
Šaltinis:
CNET News.com
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.
The most popular articles
Software company announced new structure_ of it_s business.
more »
If this week's border-transcending ruling by Germany's highest court proves anything, it's that an enormous distance remains between advocates of a free Internet and watchdogs against racism and hate-mongering.
more »
IBM Corporation announced Wednesday a new offering to deliver a range of business and technical services for the development of high-value corporate portals.
more »
A technique that exploits the way Web browsers store recently viewed data could compromise Internet users' privacy by allowing an attacker to check what sites a person has visited recently.
more »
Country music record company Fahrenheit Entertainment said it will begin selling copy-protected CDs by early next year using encryption technology from SunnComm, a little-known company based in Phoenix.
more »
Idea of "total war" redefined the conduct of armies against foreign populations in the mid-20th century.
more »
A Hong Kong-based company, I-Engine.com, has launched a wireless site development tool, I-WAP, that automatically builds and updates WAP sites.
more »
search.lt presents newest links
more »
If you're game for a challenge and desperate for money get hacking!
more »
Unlike Al Gore and George W Bush, St Chad's conduct during a disputed election helped him on his way to sainthood.
more »
Marked differences in the stages Europe's various national administrations have reached in moving towards e-government are highlighted in a new report from ICL.
more »