Skip the navigation

Worm exploits Apache vulnerability on FreeBSD

By Joris Evers, IDG News Service
July 1, 2002 12:00 PM ET

IDG News Service - A worm that can compromise systems running the Apache Web server on the FreeBSD operating system is crawling the Internet, but its spread and impact are limited, experts said today.
The worm takes advantage of a known security hole in Apache Web servers by scanning the Internet and installing a backdoor application when it finds a vulnerable Web server. This backdoor allows the attacker to remotely control the system and use it in attacks on other Web servers, according to antivirus software vendor F-Secure Corp. in Helsinki.
The open-source Apache server is the most commonly used Web server software, running on 63% of Web sites, according to a survey by Web server analysis firm Netcraft Ltd. in Bath, England.
However, the reach of the worm, dubbed Scalper by F-Secure, is limited because it affects Apache only on the open-source FreeBSD operating system, said Mikko Hypponen, research manager at F-Secure. "It only hits a small fragment of the Apache users," said Hypponen.
Mike Prettejohn, director at Netcraft, agreed. "FreeBSD is the third most popular platform for Apache after Linux and Solaris," he said.
Hypponen does not see the worm as a big danger. "The current version is low risk. It is spreading, we can see hits generated by the worm, but it is not widespread. It could infect a measurable portion of the FreeBSD Web server, but that has not happened yet," he said.
Variants of the worm attacking Apache on other platforms may soon surface, Hypponen said.
"It would be easy to change this worm to work on Linux or any other system. But then, on the positive side, I would think that Apache Web server administrators are diligent in patching, so the spread would not be as big as Code Red, which infected about 200,000 Web sites in two days about a year ago," Hypponen said.
Indeed, Apache administrators have responded swiftly, with well over 6 million Web sites already upgraded to Apache 1.3.26, a version of the software not vulnerable to this attack. However, about 14 million potentially vulnerable sites using Apache remain, Netcraft said in its monthly commentary released today.
Antivirus software vendor Sophos PLC has received a sample of the Apache worm but hasn't yet been able to make it work, said Graham Cluley, senior technology consultant at Sophos in Oxford, England.
"At the moment, we think it is a bit of a curiosity. We believe it tries to attack FreeBSD machines, but it is so unstable that getting the right configuration to make it work is tough. That, of course, also will limit the ability to spread," Cluley said.
The flaw in the Apache Web server that the worm exploits affects all versions of Apache 1.2, versions of Apache 1.3 up to 1.3.24 and versions of Apache 2 up to 2.0.36, according to a statement from the Apache Software Foundation released June 20. The new Apache 1.3.26 and Apache 2.0.39 fix the issue, the foundation said.
The flaw relates to the way the Web server parses uploaded data and can cause the software to misinterpret the size of incoming chunks of data. It can be exploited by sending a carefully crafted request to the server, said the foundation, which manages development of the open-source Apache products.




Reprinted with permission from IDG.net. Story copyright 2014 International Data Group. All rights reserved.
Our Commenting Policies