Computer Worms
Worm spreads via zero day Microsoft DNS vulnerability
Storm Worm Botnet More Powerful Than Top Supercomputers
|
|
|
Cycles of worm releases
Just as vulnerabilities have a window of exposure between the release of information about the vulnerability and the widespread use of exploits against them, worms have an interval of time between the release of the vulnerability and the appearance of the worm. Nearly any widespread application with a vulnerability can be capitalized on by a worm.
Interval between Vulnerability Announcement and Worm Appearance
Name |
Vulnerability Announced |
Worm Found |
Interval (Days) |
SQLsnake |
November 27, 2001 |
May 22, 2002 |
176 |
Code Red |
June 19, 2001 |
July 19, 2001 |
30 |
Nimda |
May 15, 2001 |
September 18, 2001 |
126 |
August 6, 2001 |
42 |
||
April 3, 2001 |
168 |
||
Sadmind/IIS |
December 14, 1999 |
May 8, 2001 |
511 |
October 10, 2000 |
210 |
||
Ramen |
July 7, 2000 |
January 18, 2001 |
195 |
July 16, 2000 |
186 |
||
September 25, 2000 |
115 |
||
Slapper |
July 30, 2002 |
September 14, 2002 |
45 |
Scalper |
June 17, 2002 |
June 28, 2002 |
11 |
Sapphire |
July 24, 2002 |
January 25, 2003 |
184 |
Table above shows the interval between the release of information about a vulnerability and the introduction of a worm that has exploited that weakness. Some worms are fast to appear, such as the Slapper worm (with an interval of 11 days), while others are much slower such as the sadmind/IIS worm (with a minimum internal of 210 days). This table clearly illustrates the need to evaluate patches for known vulnerabilities and implement them as efficiently as possible as a means to stop the spread of future worms.
This relates directly to the importance of the rapid deployment of security patches to hosts and the sound design of a network. Worms can appear rapidly (as the Slapper worm did), quickly changing the job of a security administrator or architect from prevention to damage control.
|
|
|
|
|