SHARE
Facebook X Pinterest WhatsApp

Worms Exploit Plug and Play Vulnerabilities

In 2003, the blaster worm infected as many as 10 million computers just three weeks after Microsoft Corp. issued a patch for the hole the worm exploited. Today, IT administrators would love to have even a week to patch their systems before a worm appears to exploit a new flaw. A mob of malicious programs […]

Aug 21, 2005
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

In 2003, the blaster worm infected as many as 10 million computers just three weeks after Microsoft Corp. issued a patch for the hole the worm exploited.

Today, IT administrators would love to have even a week to patch their systems before a worm appears to exploit a new flaw.

A mob of malicious programs knocked down networks across the country last week, using a powerful, remote exploit of the Windows Plug and Play service that appeared just a day after Microsoft issued a patch for the hole Aug. 9.

The fast-closing window to patch vulnerable systems is putting pressure on IT departments everywhere to find better ways to distribute patches.

But some experts warn that worm and bot outbreaks distract attention from a deeper and darker problem: undiscovered or undisclosed vulnerabilities in software running on critical systems.

By late last week, there were 19 worms that exploit the Plug and Play flaw, including new worm families such as Zotob and Dogbot and variants of Rbot, officials for security vendor Sophos plc. said.

Read more here about Zotob and PnP worms slamming 13 DaimlerChrysler plants.

The flood of malicious programs, coming so soon after the Microsoft patch, made it hard for IT staff members at many companies to patch vulnerable systems in time.

The worms knocked 13 of DaimlerChrysler AG’s U.S. manufacturing plants offline for as long as 50 minutes on Tuesday, idling as many as 50,000 workers, said spokesperson Dave Elshoff in Detroit.

Customer support workers at SBC Communications Inc. also were idled as variants of the recent Zotob and Rbot worms raced through the company’s computer network last week, causing Windows 2000 systems to reboot and hampering the ability of staff to assist customers, said spokesperson Wes Warnick in San Antonio.

SBC was still evaluating the Microsoft patch when the worms hit, Warnick said.

“A large enterprise like SBC has to do testing to make sure that those patches are compatible with existing systems,” he said.

Zotob proves that patch management isn’t enough. Click here to read more.

Microsoft and others recommend a “defense in depth” approach for customers that includes a desktop firewall, anti-virus software, intrusion detection technology and patch management tools, said Stephen Toulouse, security program manager at Microsoft’s Security Response Center, in Redmond, Wash.

A combination of those technologies kept Windows 2000 systems at Principal Financial Group from being hit with Zotob or its cousins, said Corey Null, who works in the information services group at Principal, in Des Moines, Iowa.

The company usually requires a lot of time to test patches, but the company makes an exception for high-risk threats such as the Plug and Play flaw, Null said.

But some experts warn that worm and malicious-code outbreaks can be somewhat of a smoke screen.

“Whatever Microsoft reports is only the tip of the iceberg,” said Nand Mulchandani, vice president of business development and founder of Determina Inc., a security vendor based in Redwood City, Calif. “In most of the [hacking] underground, if somebody finds a vulnerability, they’ll use it, not write a worm for it.”

Window of vulnerability

  • Aug. 9 Microsoft releases patch for vulnerability in Windows Plug and Play service
  • Aug. 10 Security experts warn of potential for a worm
  • Aug. 11 Exploit code appears
  • Aug. 14 Zotob, a worm and backdoor Trojan, appears
  • Aug. 15 Reports surface of companies and universities hit with the worm; new bots and worms using the Plug and Play hole, such as IRCbot, SDbot and Dogbot
  • Aug. 16 Reports of widespread disruptions caused by the Plug and Play worms at CNN, ABC, The New York Times, SBC and others

    Check out eWEEK.com’s for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzer’s Weblog.

  • Recommended for you...

    Channelscaler’s New Capabilities in Partner Program Automation
    Jordan Smith
    Oct 14, 2025
    OPSWAT Launches MetaDefender Drive for Handheld Security
    Jordan Smith
    Oct 7, 2025
    Why Google Is Spending $4 Billion on an AI Data Center in Arkansas
    Delinea Exec: Identity Security Crucial to Federal Agencies
    Channel Insider Logo

    Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

    Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

    Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.