GUnitSoldierPIMP Home WebSite

Home

50 Cent, Snoop Dogg Join Forces To Form Rap Supergroup
Free Search Engine Submission
Six Months After 'Wanksta,' L.A.'s A Different World For 50 Cent
For The Record: Quick News On 50 Cent, System Of A Down, A Tribe Called Quest, Blink-182, Cheap Tric
50 Cent Sued For $5 Million After Backing Out Of Show
50 Cent: Still Hungry After 4 Million Records
50 Cent, Jay-Z Set To 'Roc The Mic'
DJ Tells 50 Cent, Ja Rule: One More Dis Record, Then Quit It
For The Record: Quick News On 50 Cent, J. Lo And Bono, Al Gore And Dixie Chicks, Rosco P. Coldchain
Ja Rule Aims At Eminem, But Scarface Wasn't Aiming At 50
50 Cent Fights Tyson Beckford, Is Set Up By Mekhi Phifer
Ja Rule Calls 50 'Loose Change,' Disses 'Feminem' And Dr. Dre
Lloyd Banks Ready To Make His Classic; Recalls Liver Shot, 50 At #1
For The Record: Quick News On 50 Cent And Sean Paul, Snoop, Blink-182, Tupac, Bono & More
Eminem Says If Tupac Were Alive, 'He Would Never Ride With Ja'
50 Cent Says He And Jay-Z Will Unite Onstage, In The Studio
For The Record: Quick News On The Donnas, 50 Cent, Drowning Pool, Offspring, Bowling For Soup & More
50 Cent Doesn't Like Change, Stays At #1 On Albums Chart
Mary J. Blige Teams Up With 50 Cent, P. Diddy To Discuss Love And Life
Ja, Em And 50 Are Hot On Radio, But Should Their Disses Be?
50 Cent Says New LP Won't Come Out Till 2004, Calls Ja Rule 'Desperate'
50 Cent Returns To #1 As Fabolous, Evanescence Debut High
Mixtape Mondays: Lloyd Banks
50 Cent Still Tops; Dixie Chicks Backlash Hits Home On Albums Chart
50 Cent Still Tops; Dixie Chicks Backlash Hits Home On Albums Chart
50 Cent Disses Ja Rule On Tupac Joint; New Biggie Material On The Horizon
50 Cent Looking To Sell His Life Story
For The Record: Quick News On 50 Cent, J. Lo, Justin Timberlake, Zwan, Madonna, Ozzy, Sheryl Crow &
Mixtapes: The Other Music Industry
50 Cent To Release New Song On DVD, Plans Headlining Tour
50 Cent's Crown Can Now Fit Properly Over His Doo-Rag
For The Record: Quick News On 50 Cent, Baby, Ozzy, Nas, Radiohead, Jill Scott, Lynyrd Skynyrd & More
Is The NYPD At War With Hip-Hop?
Lil' Kim Fights To Earn Back Street Cred On Mafia LP
For The Record: Quick News On Eminem, 50 Cent, Kid Rock, Fred Durst, Pink, Beyonce, Ja Rule & More
50 Cent Is Money For Second Week on Billboard Albums Chart
Free Ring Tones!!
50 Cent Slams Into Albums Chart With Record-Breaking Debut LP
50 Cent: Money To Burn
50 Cent: Sway Tells The Story Behind The Interview
50 Cent's Album Hitting Stores Sooner Than Planned
Em's Hometown Concert In July Might Be The Eminem Show
Mixtape Mondays: DJ Boom
Ashanti, Amerie Lead Pack Of Nominees For Soul Train Awards
Industry Insiders Say Bootlegging Won't Dent 50 Cent
New Releases: 50 Cent, Johnny Marr, Pet Shop Boys, Jars of Clay, Nada Surf, Juliana Theory & More
For The Record: Quick News On 50 Cent, J. Lo, Michael Jackson, Sean Paul, Erykah Badu, Usher & More
50 Cent, Tupac Collabo Track To Hit Mixtape Circuit
For The Record: Quick News On 50 Cent, Justin Timberlake, Lil' Kim, Swizz Beatz, Reel Big Fish....
50 Cent's San Francisco Gig Shut Down By Police
Mixtape Mondays: DJ Enuff
***Security Alert! W32.SQLExp.Worm***
Gunmen Open Fire On Violator Management Offices
NEW AOL BATTLE's
Latest Computer ThreatsTrojan.Linux.JBellz
Latest Computer Threats BAT.Vandeed.Worm
NEWS - 50 Cent & Notorious B.I.G. Duet Via Technology For Underground Release
NEWS - 50 Cent Says Labels Want Studio Gangsters
NEWS - 50 Cent Says Fake Gangsters Are 'Wankstas'
50 Cent Explains What A 'Wanksta' Is
50 Cent Spends Chunks Of Change To Get Criticized By Eminem, Dre
DMX To Head North For Tour After Shooting New Flick
On The Corner Of 106 & Park With 50 Cent
***Security Alert! W32.SQLExp.Worm***

us.logo.symantec.gif

W32.SQLExp.Worm

Category3
Discovered on: January 24, 2003
Last Updated on: January 27, 2003 06:19:18 PM

W32.SQLExp.Worm is a worm that targets the systems running Microsoft SQL Server 2000, as well as Microsoft Desktop Engine (MSDE) 2000. The worm sends 376 bytes to UDP port 1434, the SQL Server Resolution Service Port.

The worm has the unintended payload of performing a Denial of Service attack due to the large number of packets it sends.

Symantec Security Response strongly recommends that all the users of either Microsoft SQL Server 2000 or MSDE 2000 audit their computers for the vulnerabilities that are referred to in Microsoft Security Bulletin MS02-039 and Microsoft Security Bulletin MS02-061.

Symantec Security Response also recommends that you:

  • Configure perimeter devices to block the ingress UDP traffic to port 1434 from untrusted hosts.
  • Block the egress UDP traffic from your network to the destination port 1434.


Removal Tool
Symantec has provided a tool to remove the infections of W32.SQLexp.Worm. Click here to obtain the tool. Try this tool first, as it is the easiest way to remove this threat. Because the worm resides in memory only and is not written to disk, the virus definitions do not detect this threat. Symantec Security Response recommends that you follow the measures described in this document to deal with this threat.

Please refer to the Technical Details section below for information on how to configure the Symantec products to detect this threat.

Also Known As: SQL Slammer Worm [ISS], DDOS.SQLP1434.A [Trend], W32/SQLSlammer [McAfee], Slammer [F-Secure], Sapphire [eEye], W32/SQLSlam-A [Sophos]
Type: Worm
Infection Length: 376 bytes
Systems Affected: Windows 95, Windows 98, Windows NT, Windows 2000, Windows XP, Windows Me
Systems Not Affected: Windows 3.x, Microsoft IIS, Macintosh, OS/2, UNIX, Linux
CVE References: CAN-2002-0649

threat assessment

Wild:

Threat Metrics

High Low Medium

Wild:
High

Damage:
Low

Distribution:
Medium


Damage

Distribution

  • Ports: UDP port 1434. The worm continuously sends traffic to randomly generated IP addresses, attempting to send itself to hosts running the Microsoft SQL Server Resolution Service, and that, therefore listens on that particular port.

technical details

When W32.SQLExp.Worm attacks a vulnerable system, it does the following:



For more information about the vulnerability that this worm exploits, refer to the following article at:
http://securityresponse.symantec.com/avcenter/security/Content/2270.html.

Symantec Gateway Security
Symantec has released updates for Symantec Gateway Security via LiveUpdate. Additionally, you may click here to learn about limiting the ingress traffic for W32.SQLExp.Worm using Symantec Gateway Security.

Enterprise Security Manager
Symantec has released an Enterprise Security Manager policy for this threat. Click here for more information.

Intruder Alert
Symantec has released an Intruder Alert 3.5/3.6 Integration Policy for NetProwler 3.5x. Click here for more information.

NetProwler
Symantec has released Security Update 22 for NetProwler 3.5.1, which includes a detection for W32.SQLExp.Worm. Click here for more information.

Symantec Enterprise Firewall, Symantec VelociRaptor, Symantec Raptor Firewall
Click here to learn about limiting the ingress traffic for W32.SQLExp.Worm using Symantec's Enterprise Firewall, VelociRaptor, and Raptor products.

ManHunt
ManHunt Protocol Anomaly Detection technology detects the traffic generated by this threat as a UDP flood. To specifically detect this threat as W32.SQLExp.Worm, Symantec recommends that users of the ManHunt product activate the HYBRID MODE function and apply the following custom rule:

*******************start file********************

#
#Variables need to be set dependent on the users network. Below are examples on how to set
# variable. For more information see ManHunt Administrative Guide: Appendix A.
#
#var EXTERNAL_NET 192.168.1.0/24
#
#
#
var EXTERNAL_NET any
var HOME_NET any
#
#
#
alert udp $EXTERNAL_NET any -> $HOME_NET 1434 (msg:"W32.SQLEXP.Worm propagation"; content:"|68 2E 64 6C 6C 68 65 6C 33 32 68 6B 65 72 6E|"; content:"|04|"; offset:0; depth:1;)

*************EOF*********************

For more information on how to create custom signatures, refer to the "ManHunt Administrative Guide: Appendix A Custom Signatures for HYBRID Mode."

recommendations

Symantec Security Response encourages all users and administrators to adhere to the following basic security "best practices":

removal instructions


Removal Tool
Symantec has provided a tool to remove the infections of W32.SQLexp.Worm. Click
here to obtain the tool. Try this tool first, as it is the easiest way to remove this threat. Because the worm resides in memory only and is not written to disk, the virus definitions do not detect this threat. Customers are recommended to follow the measures described in this document to control with this threat.

Additional information:


http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0649

http://www.cert.org/advisories/CA-2002-22.html

http://online.securityfocus.com/bid/5310

http://online.securityfocus.com/bid/5311

http://www.microsoft.com/technet/security/bulletin/ms02-039.asp

http://www.microsoft.com/technet/security/bulletin/MS02-061.asp

http://www.cisco.com/warp/public/707/cisco-sa-20030126-ms02-061.shtml


Write-up by: Douglas Knowles


THE AYMAC GROUP, INC 2002-2003 © ALL RIGHTS RESERVED.