[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Uniras Alert 21/05 Malicious software report



-----BEGIN PGP SIGNED MESSAGE-----


- ------------------------------------------------------------------------
- ----
- ------
    UNIRAS (UK Govt CERT) ALERT - 21/05 dated 17.08.05  Time: 00:10
UNIRAS is part of NISCC(National Infrastructure Security Co- ordination
Centre)
- ------------------------------------------------------------------------
- ----
- ------
   UNIRAS material is also available from its website at
www.uniras.gov.uk
and
          Information about NISCC is available from www.niscc.gov.uk
- ------------------------------------------------------------------------
- ----
- ------

Title
=====
ZOTOB.D spreading in the wild
Trend Micro:  WORM_RBOT.CBQ
Symantec:  ZOTOB.E


Detail
======

  A new variant of Zotob -- Zotob.D -- is memory-resident worm that
takes advantage of the Microsoft Windows Plug and Play vulnerability
(MS05-039) to propagate across networks.  It also connects via Internet
Relay Chat (IRC) and drops a copy of itself in the Windows system folder
as the file WINTBP.EXE.

August 14, 2005:  A worm or bot, Zotob, may be spreading which uses the
PnP vulnerability in Microsoft Windows.

August 12, 2005: Exploit code was released to the public to take
advantage
of the Windows PnP vulnerability described below.

August 9, 2005: Plug and Play (PnP) is a feature of Microsoft Windows
that
allows the easy installation of new hardware. A vulnerability has been
announced that allows a remote attacker to gain access to a remote
system
to execute code. The attacker, however, must have varying levels of
privilege based on which version of Windows is targeted. See the
Microsoft
advisory for more details.

*** RECOMMENDATIONS
Keep your Antivirus signatures up to date and check with your vendor's
website for further instructions.  Apply patches offered by the software
manufacturer.

*** FOR MORE INFORMATION
http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM%
5FZOTOB%2ED

http://securityresponse.symantec.com/avcenter/venc/data/w32.zotob.d.html
http://www.sarc.com/avcenter/venc/data/w32.zotob.d.html
http://vil.nai.com/vil/content/v_135475.htm
http://www.microsoft.com/technet/security/bulletin/ms05-039.mspx
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1983




- ------------------------------------------------------------------------
- ----
- ------

For additional information or assistance, please contact the HELP
Desk by
telephone or Not Protectively Marked information may be sent via
EMail to:
uniras@xxxxxxxxxxxx

Office Hours:
Mon - Fri: 08:30 - 17:00 Hrs
Tel: +44 (0) 20 7821 1330 Ext 4511
Fax: +44 (0) 20 7821 1686

Outside of Office Hours:
On Call Duty Officer:
Tel: +44 (0) 20 7821 1330 and follow the prompts

- ------------------------------------------------------------------------
- ----
- ------
UNIRAS wishes to acknowledge the contributions of IBM Threat team for
the
information contained in this Briefing.
- ------------------------------------------------------------------------
- ----
- ------
This Briefing contains the information released by the original
author. Some

of the information may have changed since it was released. If the
vulnerability
affects you, it may be prudent to retrieve the advisory from the
canonical
site
to ensure that you receive the most current information concerning that
problem.

Reference to any specific commercial product, process, or service by
trade
name, trademark manufacturer, or otherwise, does not constitute or imply
its endorsement, recommendation, or favouring by UNIRAS or NISCC.
The views

and opinions of authors expressed within this notice shall not be
used for
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors
or omissions contained within this briefing notice. In particular, they
shall
not be liable for any loss or damage whatsoever, arising from or in
connection
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams
(FIRST)
and has contacts with other international Incident Response Teams
(IRTs) in
order to foster cooperation and coordination in incident prevention, to
prompt
rapid reaction to incidents, and to promote information sharing
amongst its
members and the community at large.
- ------------------------------------------------------------------------
- ----
- ------
<End of UNIRAS Briefing>




-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.0.1 (Build 2185)

iQCVAwUBQwJzIYpao72zK539AQEgLQP9H6dG0xoV+Zx7LViq92UkpDIUQvQRcuam
y/rR/9SpM6jXvhhCbqg49v88MYk4DQtaCkI6px5n5pVs+NYn3tb4IqHgdG9ISc5U
95EVmG6/dAUHud4BmZ/L8072BLLu7/i03duLraPlQCiqD0T0dwsi3iSLcYtkOil+
IpmhxeJBsu0=
=NZ82
-----END PGP SIGNATURE-----


		
___________________________________________________________ To help you stay safe and secure online, we've developed the all new Yahoo! Security Centre. http://uk.security.yahoo.com