[11637] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: OpenSSL worm in the wild

daemon@ATHENA.MIT.EDU (Robin Whittle)
Sun Sep 15 20:36:04 2002

Date: Mon, 16 Sep 2002 10:08:31 +1000
From: Robin Whittle <rw@firstpr.com.au>
To: Bugtraq <BUGTRAQ@securityfocus.com>,
	Cryptography <cryptography@wasabisystems.com>,
	Apache SSL <apache-ssl@lists.aldigital.co.uk>
Cc: Ben Laurie <ben@algroup.co.uk>,
	cypherpunks <cypherpunks@einstein.ssz.com>

My RH7.2 machine was hit by this worm at 9PM Australian EST Sunday night
(6AM US East Coast time not counting summertime) and I had not noticed
mention of it on BugTraq.  Web searches found no mention of it, but the
worm arrives as nicely written source in /tmp/, so I figured it out,
turned off SSL and rebooted.  

About 6 hours later, a CERT page appeared and I expected this to be
announced on BugTraq, but since it hasn't yet, here is the URL for the
"Apache/mod_ssl worm, linux.slapper.worm and bugtraq.c worm.":

  http://www.cert.org/advisories/CA-2002-27.html


It depends on the SSL vulnerabilities described on 30 July which I had
erroneously not dealt with on my machine:

  http://www.cert.org/advisories/CA-2002-23.html


"Linux.slapper" indeed!  My 56k link to the Net was flooded with UDP
port 2002 packets from other machines.  The financial cost of this over
a few days at ~USD$0.09 a Megabyte would have been serious and the link
almost unusable, but my ISP (Telstra Internet) quickly responded to my
3AM request and filtered UDP port 2002 at their router.

  - Robin


  http://www.firstpr.com.au http://fondlyandfirmly.com

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post