The security researchers at eEye Digital Security are not impressed with the Sasser worm
Published:
3 May 2004 y., Monday
The company, which found the flaws that were exploited by both the MSBlast worm and the Witty worm, on Saturday started analyzing the latest piece of attack code that takes advantage of a Microsoft Windows vulnerability discovered by its researchers. So far, eEye's analysts are surprised that the worm has spread so far.
The Sasser worm started spreading late Friday, and so far has not racked up the crowd of compromised computers that its predecessors have been able to claim. Such a limited spread could indicate that computer users are becoming more diligent about heeding warnings and patching their systems, but security researchers believe that the worm's poor programming has given network administrators a break.
"If this virus was better written, you would have seen more impact," said Alfred Huger, senior director of security firm Symantec's response center.
The Sasser worm spreads from infected computer to vulnerable computer with no user interaction required. The worm exploits a recent vulnerability in a component of Microsoft Windows known as the Local Security Authority Subsystem Service, or LSASS. After scanning for vulnerable Windows XP and Windows 2000 systems, the worm creates a remote connection to the system, installs a file transfer protocol (FTP) server and then downloads itself to the new host.
Šaltinis:
CNET News.com
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.
The most popular articles
Software company announced new structure_ of it_s business.
more »
Executives at the American Muslim Council are mad as hell.
more »
The foundation of modern computing was something of an accident.
more »
America Online's popular AIM instant messaging application has found a home on cell phone service offered by VoiceStream Wireless.
more »
The deadly attacks of September 11 didn't just give us tighter airport checkpoints, new wiretapping and surveillance laws, and countless metric tons of explosives air-lifted to Afghanistan.
more »
For the price of registering a domain name, a 30-year-old Web designer from Los Angeles has bought a bizarre piece of Internet history.
more »
Japan's NTT DoCoMo has unveiled new weapons in its war against junk e-mail
more »
The use of speech recognition technology in telephone call centers is about to enter the mainstream
more »
The information breach exposed the names and diagnoses of children and teenagers being treated for such conditions as schizophrenia, retardation and depression.
more »
Smart shirts embedded with optic fibers can monitor wearer's condition and transmit data wirelessly.
more »
A computer hacker who vandalized a pro-Israeli group's Web site said law enforcement officials have issued an arrest warrant for the wrong person.
more »