Sleep well; OS/2's still awake! ;)
Per what I have read, it is a reportedly well written Visual C
creation which uses NETBIOS over TCP/IP in a cascaded Port 137 and
Port 139 TCP romp to infect boxes connected to an IP.
According to that report, the virus requires M$ Lookout (or a user who
is as brain-dead as Lookout) to be activated, as it is
transported as a mail attachment. The mail message is
the Trojan, I suppose. The size of the executable
attachment is always 50,688 bytes. [A "virus" the size
of an elephant!]
Unless you are running Lookout, there should be no
real threat to an OS/2 box. [Assuming the BBC is
correct.]
Sleep well; OS/2's still awake! ;)
Yes Dave..
According to that report, the virus requires M$ Lookout (or a user who
is as brain-dead as Lookout) to be activated, as it is
transported as a mail attachment. The mail message is
the Trojan, I suppose. The size of the executable
attachment is always 50,688 bytes. [A "virus" the size
of an elephant!]
Unless you are running Lookout, there should be no
real threat to an OS/2 box. [Assuming the BBC is
correct.]
The point is that NIMDA.A, a similar sort of approach, before the[snip]
entire attack profile of the creation was propagated, *WAS* able to download READ.ME and so on actually into the OS/2 box into various directories.
The GUEST account has no access to any shares in OS/2
unless you explicitly
grant it access. In other words, there's no
vulnerability unless you take
specific actions to create one.
Sleep well; OS/2's still awake! ;)
But in this case, Mike ..
The GUEST account has no access to any shares in OS/2
unless you explicitly
grant it access. In other words, there's no
vulnerability unless you take
specific actions to create one.
I used GUEST ... with a password. It was used for planned access, but passworded. In theory, it shouldn't have been compromiseable but
somehow was. I only got two passes at this to research. The first one was complete surprise. The second one I missed just the very start of
the attack with the trace, so we didn't learn exactly what the first
few packets were like,
It would have been nice to know exactly where the hole was. But with
time so fleeting and no spare equipment to set up a 'pot', I opted to
just get rid of Netbios over TCP/IP that wasn't needed on the box at
that point.
If you have any theory on how this might have taken place passworded,
I'd like to know your thoughts. Several others spent a good period of research time looking at the packet trace and so on. Far more informed that I'll ever be at networking. They came away puzzled as well in
that there appeared to be no PW crack run or whatever associated with
the incidents.
One other part of the puzzle might be useful. In this case the
passworded GUEST account had been used prior to the attack(s). I'm not sure about what the status of the connection being active at these starting point, whether the share was actually in use or not.
All I can think of, without knowing the details, is that you left the password as optional (which is the default for the user GUEST).
*** Quoting Mike Ruskai to Mike Luther dated 10-14-02 ***
All I can think of, without knowing the details, is that you left the password as optional (which is the default for the user GUEST).
Mike,
How would you change the password to required??
I would have thought even if it was optional -and- a valid password
was entered then trying to logon with a blank password should fail.
The user management screen has a set of radio buttons for making the password optional or required. It defaults to optional for the GUEST account. It defaults to required for all new accounts.
I'm not sure if there are any command-line use management programs
Basically, one should leave the GUEST account as is, and create new ones for password-protected access to resources.
Sleep well; OS/2's still awake! ;)
Sysop: | digital man |
---|---|
Location: | Riverside County, California |
Users: | 1,028 |
Nodes: | 17 (0 / 17) |
Uptime: | 179:44:31 |
Calls: | 503,702 |
Calls today: | 5 |
Files: | 158,902 |
D/L today: |
12,098 files (3,486M bytes) |
Messages: | 444,303 |
Posted today: | 2 |