Worm exploits Apache vulnerability on FreeBSD
IDG News Service - A worm that can compromise systems running the Apache Web server on the FreeBSD operating system is crawling the Internet, but its spread and impact are limited, experts said today.
The worm takes advantage of a known security hole in Apache Web servers by scanning the Internet and installing a backdoor application when it finds a vulnerable Web server. This backdoor allows the attacker to remotely control the system and use it in attacks on other Web servers, according to antivirus software vendor F-Secure Corp. in Helsinki.
The open-source Apache server is the most commonly used Web server software, running on 63% of Web sites, according to a survey by Web server analysis firm Netcraft Ltd. in Bath, England.
However, the reach of the worm, dubbed Scalper by F-Secure, is limited because it affects Apache only on the open-source FreeBSD operating system, said Mikko Hypponen, research manager at F-Secure. "It only hits a small fragment of the Apache users," said Hypponen.
Mike Prettejohn, director at Netcraft, agreed. "FreeBSD is the third most popular platform for Apache after Linux and Solaris," he said.
Hypponen does not see the worm as a big danger. "The current version is low risk. It is spreading, we can see hits generated by the worm, but it is not widespread. It could infect a measurable portion of the FreeBSD Web server, but that has not happened yet," he said.
Variants of the worm attacking Apache on other platforms may soon surface, Hypponen said.
"It would be easy to change this worm to work on Linux or any other system. But then, on the positive side, I would think that Apache Web server administrators are diligent in patching, so the spread would not be as big as Code Red, which infected about 200,000 Web sites in two days about a year ago," Hypponen said.
Indeed, Apache administrators have responded swiftly, with well over 6 million Web sites already upgraded to Apache 1.3.26, a version of the software not vulnerable to this attack. However, about 14 million potentially vulnerable sites using Apache remain, Netcraft said in its monthly commentary released today.
Antivirus software vendor Sophos PLC has received a sample of the Apache worm but hasn't yet been able to make it work, said Graham Cluley, senior technology consultant at Sophos in Oxford, England.
"At the moment, we think it is a bit of a curiosity. We believe it tries to attack FreeBSD machines, but it is so unstable that getting the right configuration to make it work is tough. That, of course, also will limit the ability to spread," Cluley said.
The flaw in the Apache Web server that the worm exploits affects all versions of Apache 1.2, versions of Apache 1.3 up to 1.3.24 and versions of Apache 2 up to 2.0.36, according to a statement from the Apache Software Foundation released June 20. The new Apache 1.3.26 and Apache 2.0.39 fix the issue, the foundation said.
The flaw relates to the way the Web server parses uploaded data and can cause the software to misinterpret the size of incoming chunks of data. It can be exploited by sending a carefully crafted request to the server, said the foundation, which manages development of the open-source Apache products.
- Fight Malware, Malfeasance and Malingering Every year brings more extreme sets of threats than the last. The good news is that there are a range of mitigation options....
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Malware and Vulnerabilities White Papers | Webcasts