Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Initial a Process over the Network in Memory

Posted on 2001-07-30
3
Medium Priority
?
187 Views
Last Modified: 2010-04-06
Hi,
I read the advisory from the Code Red Worm and I wonder how could a Executeable create a Process over the Network in an other Computers Memory (in Delphi)?

Cheers Micha
0
Comment
Question by:PROGRAMMING030999
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 3

Accepted Solution

by:
rondi earned 1200 total points
ID: 6336929
Symantec says:

>The CodeRed Worm affects Microsoft Index Server 2.0 and >the Windows 2000 Indexing service on computers running >Microsoft Windows NT 4.0 and Windows 2000 that run
>IIS 4.0 and 5.0 Web servers. The worm uses a known buffer
>overflow vulnerability contained in the file Idq.dll...

>The worm sends its code as an HTTP request. The HTTP >request exploits a known buffer-overflow vulnerability, >which allows the worm to run on your computer. The >malicious code is not saved as a file, but is inserted >into and then run directly from memory...

I have no idea how the worm gets code encoded as an
HTTP request to be loaded into memory as executable code.
It's pretty smart, though.

Without knowing the internal workings of IIS's DLLs, I think it'd be pretty difficult to create a remote process
without using some other existing 'listener' on the remote
machine to instantiate the process.

rondi
0
 
LVL 26

Expert Comment

by:Russell Libby
ID: 8734998
No comment has been added lately, so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area that this question is:

Accept rondi's comment as answer

Please leave any comments here within the next seven days.
 
PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER!
 
Thank you,
Russell

EE Cleanup Volunteer
0

Featured Post

Keep up with what's happening at Experts Exchange!

Sign up to receive Decoded, a new monthly digest with product updates, feature release info, continuing education opportunities, and more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The uses clause is one of those things that just tends to grow and grow. Most of the time this is in the main form, as it's from this form that all others are called. If you have a big application (including many forms), the uses clause in the in…
Objective: - This article will help user in how to convert their numeric value become words. How to use 1. You can copy this code in your Unit as function 2. than you can perform your function by type this code The Code   (CODE) The Im…
Video by: ITPro.TV
In this episode Don builds upon the troubleshooting techniques by demonstrating how to properly monitor a vSphere deployment to detect problems before they occur. He begins the show using tools found within the vSphere suite as ends the show demonst…
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…
Suggested Courses

618 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question