Naughty Naughty analysis :) You should be ok if an infected SQL server is not on your subnet.
We saw internal and border routers today hitting 80 and 100% utilization. In addition to firewalls taking a massive beating.. As I stated before, although your are not infected yourself, you still have to deny all of those packets heading your way. Danny On 25/Jan/2003 14:45:11, Vital Touch DJs wrote: > You will be alright if you are using MySQL. MySQL uses Port 3306 for all > communication, unlike the port 1434 that MS SQL uses, and the port that was > meant to be attacked. > > -----Original Message----- > From: [EMAIL PROTECTED] [<A >HREF="mailto:[EMAIL PROTECTED]">mailto:[EMAIL PROTECTED]</a>]On Behalf > Of Rodney Richison > Sent: Saturday, January 25, 2003 2:32 PM > To: sambar List Member > Subject: [sambar] OffTopic: New Round of UDP Port 1434 Scans {03} > > > Striving for clarity. If your running mysql and not M$ sql, you should be > ok? > > > Highest Regards > Rodney Richison > 918-358-1111 > <A HREF="http://www.rcrnet.net">www.rcrnet.net</a> > ----- Original Message ----- > From: "Danny Mallory" <[EMAIL PROTECTED]> > To: "sambar List Member" <[EMAIL PROTECTED]> > Sent: Saturday, January 25, 2003 1:23 PM > Subject: [sambar] OffTopic: New Round of UDP Port 1434 Scans {02} > > > > We have already been involved in this ourselves.. It appears that any SQL > server 2k missing at least MS02-061 (cumulative) does not contain patches > for MS02-039 (serveral vulnerabilities).. This specific hole exploits the > vulnerability with the keep alive mechanism. > > > > Although all of our SQL instances are in good shape, be prepared for some > network saturation... Not as ugly as Nimda but it is already known to have > created denial of services for other boxes in that subnet. > > > > Danny > > > > On 25/Jan/2003 09:56:36, Jeff Adams wrote: > > > This morning I woke up to find hundreds and hundreds of UDP port scans > for > > > port 1434 (all blocked, of course). I thought that was odd so I looked > up > > > what runs on port 1434 and found that's what Microsoft's SQL server > > > uses. A couple minutes later I browsed to Yahoo! and saw a news story > > > (below) that explained my scans. > > > > > > -Jeff > > > > > > > > > <A TARGET="_blank" > HREF="http://story.news.yahoo.com/news?tmpl=story&u=/ap/20030125/ap_wo_e > n_po/na_gen_internet_attack_2">http://story.news.yahoo.com/news?tmpl=story&u > =/ap/20030125/ap_wo_en_po/na_gen_internet_attack_2</a> > > > > > > Internet traffic broadly affected by electronic attack > > > Sat Jan 25, 6:07 AM ET > > > > > > By TED BRIDIS, Associated Press Writer > > > > > > WASHINGTON - Traffic on the many parts of the Internet slowed > dramatically > > > early Saturday, the apparent effects of a fast-spreading, virus-like > > > infection in the world's digital pipelines and interfering with Web > > > browsing and delivery of e-mail. > > > > > > Sites monitoring the health of the Internet reported significant > slowdowns > > > globally. Experts said the latest electronic attack bore remarkable > > > similarities to "Code Red" virus during the summer of 2001 which also > > > ground traffic to a halt on much of the Internet. > > > > > > "It's not debilitating," said Howard Schmidt, one of President George W. > > > Bush (news - web sites)'s top cyber-security advisers. "Everybody seems > to > > > be getting it under control." Schmidt said the FBI (news - web sites)'s > > > National Infrastructure Protection Center and private experts at the > CERT > > > Coordination Center (news - web sites) were monitoring the attacks. > > > > > > The virus-like attack sought out vulnerable computers to infect on the > > > Internet using a known flaw in popular database software from Microsoft > > > Corp., called "SQL Server." But the attacking software code was scanning > > > for victim computers so randomly and so aggressively sending out > thousands > > > of probes each second that it overwhelmed many Internet data pipelines. > > > > > > "This is like Code Red all over again," said Marc Maiffret, an executive > > > with eEye Digital Security, whose engineers were among the earliest to > > > study samples of the attack software. "The sheer number of attacks is > > > eating up so much bandwidth that normal operations can't take place." > > > > > > The attack sought to take advantage of a software flaw discovered in > July > > > 2002 that permits hackers to infect corporate database servers. > Microsoft > > > deemed the problem "critical" and offered a free repairing patch, but it > > > was impossible to know how many computer administrators applied the fix. > > > > > > "People need to do a better job about fixing vulnerabilities," Schmidt > said. > > > ------------------------------------------------------- > > > To unsubscribe please go to <A TARGET="_blank" > HREF="http://www.sambar.ch/list/">http://www.sambar.ch/list/</a> > > > > > > > > > > > ------------------------------------------------------- > > To unsubscribe please go to <A TARGET="_blank" >HREF="http://www.sambar.ch/list/">http://www.sambar.ch/list/</a> > > > > > > > ------------------------------------------------------- > To unsubscribe please go to <A TARGET="_blank" >HREF="http://www.sambar.ch/list/">http://www.sambar.ch/list/</a> > ------------------------------------------------------- > To unsubscribe please go to <A TARGET="_blank" >HREF="http://www.sambar.ch/list/">http://www.sambar.ch/list/</a> > > > ------------------------------------------------------- To unsubscribe please go to http://www.sambar.ch/list/
