Merit Network
Can't find what you're looking for? Search the Mail Archives.
  About Merit   Services   Network   Resources & Support   Network Research   News   Events   Home

Discussion Communities: Merit Network Email List Archives

North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: W32/Sobig-F - Halflife correlation ???

  • From: Adam 'Starblazer' Romberg
  • Date: Tue Aug 26 07:14:19 2003

Regarding the half life exploits, the 'remote root' exploits have been
addressed to VALVe and they were fixed in 3.1.1.1d for linux (4.1.1.1d
for win32).. which was released July 30th 2003[1].

Now, the bug was reported to VALVe on April 18th 2003, but it didnt hit
bugtraq until July 29th, 2003[2].

On the other hand though, alot of server admins(from what I can grasp from
the hlds_linux mailing list) do not run x.1.1.1d for the simple fact that it
uses a bit more CPU then x.1.1.0c.  There is an unoffical patch for
x.1.1.0c that does plug the hole.

Unless this worms communicating with an unknown hole or something...

Thanks

Adam

[1] http://www.mail-archive.com/hlds_linux%40list.valvesoftware.com/msg17381.html
[2] http://www.securityfocus.com/archive/1/330880/2003-07-26/2003-08-01/0

----------------------------------------------------
Adam 'Starblazer' Romberg     Appleton: 920-738-9032
System Administrator
ExtremePC LLC    -=-  http://www.extremepcgaming.net

On Mon, 25 Aug 2003, Darren Smith wrote:

>
> Did anyone else see anything with regards to this thread?
>
> Regards
>
> Darren Smith
>
> ----- Original Message -----
> From: "Darren Smith" <data@barrysworld.com>
> To: "Robert Blayzor" <rblayzor@inoc.net>; "North American Network Operators Group"
> <nanog@merit.edu>
> Sent: Saturday, August 23, 2003 1:22 PM
> Subject: Re: W32/Sobig-F - Halflife correlation ???
>
>
> >
> > Hi
> >
> > Just a quick look at my syslog file, where MOO is the name of my ACL.
> >
> > fgrep MOO /var/log/cisco/<router>.log | grep 27015 -c
> > 2383
> >
> > fgrep MOO /var/log/cisco/<router>.log | grep 27016 -c
> > 459
> >
> > fgrep MOO /var/log/cisco/<router>.log | grep 27017 -c
> > 210
> >
> > fgrep MOO /var/log/cisco/<router>.log | grep 27018 -c
> > 59
> >
> > As you can see most of them were on 27015, these logs were from just one of
> > my transit interfaces.
> >
> > Best Regards
> >
> > Darren Smith
> >
> > ----- Original Message -----
> > From: "Robert Blayzor" <rblayzor@inoc.net>
> > To: "North American Network Operators Group" <nanog@merit.edu>
> > Sent: Saturday, August 23, 2003 1:05 PM
> > Subject: Re: W32/Sobig-F - Halflife correlation ???
> >
> >
> > >
> > > On 8/23/03 7:17 AM, "Darren Smith" <data@barrysworld.com> wrote:
> > >
> > > > They were trying to hit servers in multiple subnets, all on ports 270XX.
> > >
> > > I'm not sure on this.  Lots of gaming servers use the 270XX UDP range.
> > > Quake3, HL, etc.
> > >
> > > It may be possible it's just probing for other HL servers running on
> > > different ports.  A lot of these games also use the same gaming engine for
> > > the network and graphics abilities, so it's possible HL may not be the
> > only
> > > "game server" in the mix, it may be any game that uses the HL engine.  I
> > > know there are several out there, Counterstrike being one of them.
> > >
> > > So if it's not looking for a HL only exploit, I'd bet it's trying to get
> > the
> > > infected machines to link up and communicate via the network of gaming
> > > servers.  This could be very bad because there could be virtually no way
> > to
> > > stop this other than taking down the "Game Spy" type networks so the
> > > computers can't find each other.
> > >
> > > --
> > > Robert Blayzor, BOFH
> > > INOC, LLC
> > > rblayzor@inoc.net
> > > PGP: http://www.inoc.net/~dev/
> > > Key fingerprint = A445 7D1E 3D4F A4EF 6875  21BB 1BAA 10FE 5748 CFE9
> > >
> > > "Oh my God, Space Aliens!!  Don't eat me, I have a wife and kids!
> > >                 Eat them!"  -- Homer J. Simpson
> > >
> > >
> > >
> >
> >
>
>






Discussion Communities


About Merit | Services | Network | Resources & Support | Network Research
News | Events | Contact | Site Map | Merit Network Home


Merit Network, Inc.