On 16 August 2005 security company Sophos discovered a new worm that was taking advantage of the Microsoft exploit MS05-039. You may have heard of this Worm in the news. It’s responsible for infecting computers at several high profile companies such as The New York Times, CNN and ABC. Microsoft thought the threat so severe that it rolled out an update for its Malicious Software Removal Tool before the normal scheduled update.
This is an exploit that allows a buffer overflow in the Plug-n-Play service in Windows. The worm sends SYN packets to TCP Port 445 looking for unpatched machines. Once Zotob finds a vulnerable system it creates a buffer overflow and sends out shellcode to the exploited system. This creates an FTP script that connects to a remote site and downloads the Worm. The Worm enables a backdoor IRC allowing the attacker to remotely send commands to the infected computer.
There have been plenty of variants of the Zotob in the 20 days of its existence and have all really been restricted to Windows 2000 machines, however the Microsoft exploit includes any operating system with the “Simple file sharing” option. This option is only available in windows XP (Home and Pro) and Windows 2000.
Symantec’s “Deep Site” threat analysts team has discovered a way to possibly utilize the Zotob in the Windows XP environment. With Simple file sharing enabled, for example, sharing a folder or even printer between two computers and having the guest account turned on.
Though it’s possible it hasn’t been seen yet, in my opinion why wait for something to happen? Be proactive about your protection. You can patch the exploit with the P-n-P by going to Microsoft and downloading the patch. Then you should turn off your Guest account or at least passwords protect it. Also you want to make sure your firewall is operating and you may even want to watch the activity log, for any application accessing TCP/IP port 445.
Here’s Microsoft’s security bulletin and fix…
Stay safe out there,
~ Chad Stelnicki