{"id":4,"date":"2003-01-29T02:48:42","date_gmt":"2003-01-28T19:48:42","guid":{"rendered":""},"modified":"2003-01-29T02:48:42","modified_gmt":"2003-01-28T19:48:42","slug":"microsoft-not-immune-to-slammer","status":"publish","type":"post","link":"https:\/\/deepquest.code511.com\/blog\/2003\/01\/microsoft-not-immune-to-slammer\/","title":{"rendered":"Microsoft not immune to Slammer"},"content":{"rendered":"<p>An insight into the problems faced by Microsoft indealing with the Slammer (aka Sapphire) worm is revealed in internal company memos leaked to El Reg. <\/p>\n<p>The email memos from Microsoft security team (18 in all of which we publish only the first [most illuminating] four) reveal a giant corporation struggling to contain the effects of a virulent worm, which knocked many of its Internet services offline. <\/p>\n<p>Those who blame system admins for the  spread of the worm might do well to ponder on the fact even Microsoft had not applied its fix which, it&#8217;s now clear, was far from easy to apply. <!--more--><\/p>\n<p>From: Mike Carlson (ITG)<br \/>\nSent: Saturday, January 25, 2003 8:04 AM<br \/>\nTo: EIS Data Center Clients; uDRM Operations Team; Gregory Wood&#8217;s Direct<br \/>\nReports; IR\/ID<br \/>\nCc: HUSK:Corporate Data Center Release Management; ITG DR Command Team; ITG  DR Functional Command Team; Randy Coggan; Jim DuBois Direct Reports; Steven Rees <\/p>\n<p>< Microsoft Confidential - Do Not Forward!  > <\/p>\n<p>Event Description: <\/p>\n<p>At approx 10:00 pm traffic on the corporate network jumped dramatically, eventually bringing nearly all services to a crawl. The root cause appears at this time to be a virus attacking SQL servers on UDP port 1434. The problem is not confined to MS only, as there are reports of widespread impact at other companies and across the Internet. <\/p>\n<p>Start Date\/Time: <\/p>\n<p>Approximately 10:00 PM PST, Friday 1\/24\/2003. <\/p>\n<p>Impact: <\/p>\n<p>All apps and services are potentially affected and performance is sporadic as best.  The network is essentially flooded with traffic, making it difficult to gather details concerning the impact. <\/p>\n<p>Status Update: <\/p>\n<p>Confirmed SQL SP3 does protect the system from the virus, but believe we may have a hot fix that could be remotely applied to SP2 as well. All systems owners should make plans to update their systems asap. <\/p>\n<p>ETA:  None. <\/p>\n<p>Action Required: <\/p>\n<p>Owners should be planning to upgrade their systems asap. <\/p>\n<p>Next Update: 0900 <\/p>\n<p>From: Mike DeGooyer<br \/>\nSent: Saturday, January 25, 2003 9:15 AM<br \/>\nTo: EIS Data Center Clients; Gregory Wood&#8217;s Direct Reports; IR\/ID<br \/>\nCc: Broadband Networking All; Corporate Data Center Release Management; ITG<br \/>\nDR Command Team; ITG DR Functional Command Team; Randy Coggan; Jim DuBois Direct Reports; Steven Rees <\/p>\n<p>Microsoft Confidential <\/p>\n<p>Do Not Forward <\/p>\n<p>Corporate Network Outage: 1-24-03 <\/p>\n<p>Update: Network traffic is still affected and inhibiting traffic. Effected resources have been identified and operations is isolating network traffic to apply the fix upon completion. <\/p>\n<p>Next Update: 1000 PST or when implementation steps are ready. <\/p>\n<p>Action Required: <\/p>\n<p>None at this time. Effected resources owners will be contacted. <\/p>\n<p>Description: <\/p>\n<p>At approximately 10:00pm PST traffic on the corporate network increased dramatically due to a virus attack directed at SQL Server. The interruption was not directed at Microsoft Resources. <\/p>\n<p>Event Summary: <\/p>\n<p>8:00am  Specific file versions and server impact is being assessed. <\/p>\n<p>7:00am  Engineering testing application of hot fix that could be remotely applied to SP2. <\/p>\n<p>6:00am  Engineering confirmed SQL SP3 protects systems. Preparing to engage effected server owners. <\/p>\n<p>5:00am  Identifying that patch that will fully protect the systems. <\/p>\n<p>4:00am  Virus behavior was identified. Working on resolution process. <\/p>\n<p>3:00am  SQL Dev and engineering are engaged isolating the issue. <\/p>\n<p>2:00am  Engineering engaged to isolate the issue and behavior patterns. <\/p>\n<p>1:16am   Notification sent clients. <\/p>\n<p>____________ <\/p>\n<p>Mike DeGooyer<br \/>\nEIS Release Management- BGIT <\/p>\n<p>[contact details deleted] <\/p>\n<p>From: Mike DeGooyer<br \/>\nSent: Saturday, January 25, 2003 11:23 AM<br \/>\nTo: Mike DeGooyer; EIS Data Center Clients; Gregory Wood&#8217;s Direct Reports;<br \/>\nIR\/ID<br \/>\nCc: Broadband Networking All; Corporate Data Center Release Management; ITG<br \/>\nDR Command Team; ITG DR Functional Command Team; Randy Coggan; Jim DuBois  Direct Reports; Steven Rees; uDRM Operations (MSE); Corporate Data Center Release Management <\/p>\n<p>Update:  HELP NEEDED:  If you have servers that are nonessential, please shut down the MSSQLSERVER service as well as SQL Agent (so SQL doesn&#8217;t restart) so that we can eliminate nonessential noise\/traffic on the network. Your urgent assistance with this will be very helpful. <\/p>\n<p>SQL Development and Engineering are engaged. Network traffic is still affected and inhibiting traffic. Operations are isolating network traffic to apply the fix upon completion. <\/p>\n<p>Next Update: 1200 PST or when implementation steps are ready. <\/p>\n<p>____________ <\/p>\n<p>Mike DeGooyer <\/p>\n<p>EIS Release Management- BGIT <\/p>\n<p>[contact details deleted] <\/p>\n<p>From: Chad Lewis<br \/>\nSent: Saturday, January 25, 2003 12:35 PM<br \/>\nTo: EIS Data Center Clients; Gregory Wood&#8217;s Direct Reports; IR\/ID; ITG DR<br \/>\nCommand Team; ITG DR Functional Command Team<br \/>\nCc: Broadband Networking All; Corporate Data Center Release Management;<br \/>\nRandy Coggan; Jim DuBois Direct Reports; Steven Rees; uDRM Operations<br \/>\n(MSE); Phil Nguyen (ITG); Mike DeGooyer; Building 11 MCSS Members; TK MCSS<br \/>\nStaff; Jim Pauley; Global Networks Operations Center; Steven Rees; Paul<br \/>\nOlson; Peter Tutak; MSN IA Core <\/p>\n<p>**Microsoft Confidential &#8211; Do Not Forward!** <\/p>\n<p>Status Update: <\/p>\n<p>If you have SQL servers that are nonessential, please shut down the MSSQLSERVER service as well as SQL Agent (so SQL does not restart) so that we can eliminate nonessential noise\/traffic on the network. Your urgent assistance is required. <\/p>\n<p>Within the next 60 minutes, the 039 SQL patch will be scripted for deployment to all SQL servers outside the data center to reduce traffic volume on the network. For details on 039, visit<br \/>\n[url=http:\/\/www.microsoft.com\/technet\/treeview\/default.asp?url=\/technet\/security\/bulletin\/MS02-039.asp]www.microsoft.com\/technet\/treeview\/default.asp?url=\/technet\/security\/bulletin\/MS02-039.asp[\/url]<br \/>\nImpact will be a cycling of the SQL service. <\/p>\n<p>We are investigating the best method of addressing the data center space and will communicate during next update. <\/p>\n<p>Next update 1:30pm, or as needed. <\/p>\n<p>Chad Lewis <\/p>\n<p>EIS Release Management <\/p>\n<p>by john.leyden from [url=]http:\/\/www.theregister.co.uk\/content\/56\/29073.html[\/url]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft&#8217;s policy of relying on software patches to fix major security flaws was questioned Monday<br \/>\nafter a series of internal e-mails revealed that the software giant&#8217;s own network wasn&#8217;t immune from a worm that struck the Internet last weekend.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6],"tags":[],"class_list":["post-4","post","type-post","status-publish","format-standard","hentry","category-m"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4bBYZ-4","_links":{"self":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/4","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/comments?post=4"}],"version-history":[{"count":0,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/4\/revisions"}],"wp:attachment":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/media?parent=4"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/categories?post=4"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/tags?post=4"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}