Page 1469 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1469

occur on the internet. Since that time, hundreds of new worms (with
               thousands of variant strains) have unleashed their destructive power

               on the internet. The following sections examine some specific worms.


               Code Red Worm

               The Code Red worm received a good deal of media attention in the
               summer of 2001 when it rapidly spread among web servers running
               unpatched versions of Microsoft’s Internet Information Server (IIS).
               Code Red performed three malicious actions on the systems it
               penetrated:

                    It randomly selected hundreds of Internet Protocol (IP) addresses

                    and then probed those addresses to see whether they were used by
                    hosts running a vulnerable version of IIS. Any systems it found
                    were quickly compromised. This greatly magnified Code Red’s
                    reach because each host it infected sought many new targets.

                    It defaced HTML pages on the local web server, replacing normal
                    content with the following text:


                    Welcome to http://www.worm.com!
                    Hacked By Chinese!

                    It planted a logic bomb that would initiate a denial-of-service
                    attack against the IP address 198.137.240.91, which at that time
                    belonged to the web server hosting the White House’s home page.
                    Quick-thinking government web administrators changed the White

                    House’s IP address before the attack actually began.
               The destructive power of worms poses an extreme risk to the modern

               internet. System administrators simply must ensure that they apply
               appropriate security patches to their internet-connected systems as
               software vendors release them. As a case in point, a security fix for an
               IIS vulnerability exploited by Code Red was available from Microsoft
               for more than a month before the worm attacked the internet. Had

               security administrators applied it promptly, Code Red would have
               been a miserable failure.



                  RTM and the Internet Worm
   1464   1465   1466   1467   1468   1469   1470   1471   1472   1473   1474