- Worldstart's Tech Tips Newsletter - http://www.worldstart.com -
Posted By On September 15, 2005 @ 4:07 PM In Security Help | Comments Disabled
This is an exploit that allows a buffer overflow in the Plug-n-Play service in Windows. The worm sends SYN packets to TCP Port 445 looking for unpatched machines. Once Zotob finds a vulnerable system it creates a buffer overflow and sends out shellcode to the exploited system. This creates an FTP script that connects to a remote site and downloads the Worm. The Worm enables a backdoor IRC allowing the attacker to remotely send commands to the infected computer.
There have been plenty of variants of the Zotob in the 20 days of its existence and have all really been restricted to Windows 2000 machines, however the Microsoft exploit includes any operating system with the “Simple file sharing” option. This option is only available in windows XP (Home and Pro) and Windows 2000.
Symantec’s “Deep Site” threat analysts team has discovered a way to possibly utilize the Zotob in the Windows XP environment. With Simple file sharing enabled, for example, sharing a folder or even printer between two computers and having the guest account turned on.
Though it’s possible it hasn’t been seen yet, in my opinion why wait for something to happen? Be proactive about your protection. You can patch the exploit with the P-n-P by going to Microsoft and downloading the patch. Then you should turn off your Guest account or at least passwords protect it. Also you want to make sure your firewall is operating and you may even want to watch the activity log, for any application accessing TCP/IP port 445.
Here’s Microsoft’s security bulletin and fix…
Stay safe out there,
~ Chad Stelnicki
Article printed from Worldstart's Tech Tips Newsletter: http://www.worldstart.com
URL to article: http://www.worldstart.com/w32zotob/