Dabber worm exploits Sasser flaw

An internet worm is spreading by exploiting a flaw in Sasser, a security alert warned yesterday.

An internet worm is spreading by exploiting a flaw in Sasser, a security alert warned yesterday.

The new worm, tentatively named Dabber, takes advantage of a vulnerability in an FTP server component in the Sasser worm and may have infected thousands of computers infected with Sasser.

Dabber is believed to be the first worm that spreads specifically by targeting a flaw in another worm's code, claimed an advisory published by LURHQ, a Chicago managed security services company. (See: http://www.lurhq.com/dabber.html.)

The worm uses code written to exploit the FTP flaw and was recently released on the internet, scanning the Internet on port 5554 for computers running Microsoft Windows and infected with Sasser, LURHQ said.

When it finds vulnerable hosts, it connects to the victim and uses a built-in FTP server to transfer the worm file, named "package.exe," to the system. When run, the Dabber worm installs itself on Windows, shuts down the Sasser worm and other worm processes, then prevents them from running again.

Dabber also opens TCP port 9898 as a backdoor, which can be used by a remote attacker to download other code or communicate with the infected host, LURHQ said.

Dabber did not appear to be spreading quickly yesterday, but the number of infections was escalating, LURHQ said.

Sasser appeared on 1 May, and exploits a recently disclosed hole in a Windows component called the Local Security Authority Subsystem Service, or LSASS. Microsoft released a software patch, MS04-011, on 13 April.

Dabber is similar to Sasser and earlier worms such as Blaster because users do not need to receive an e-mail message or open a file to be infected. Instead, just having a Sasser-infected Windows machine connected to the internet is enough to catch Dabber.

Last week, Microsoft acknowledged that more than 1.5 million copies of a Sasser cleanup tool were downloaded from its website within the first 48 hours after it was offered.

Paul Roberts writes for IDG News Service

Read more on IT risk management