How do viruses spread by open network shares on Windows machines?

Posted on 2009-04-12
Last Modified: 2013-11-22
I have been reading about the conflicker virus, and wonder about the reference of it infecting distant machines through open network shares. I cannot find a way for a virus to invoke a remote execution to infect a distant machine. Because of Microsoft's "helpful" behavior, I can see how a virus may trick a user into executing it, but I don't see how it can execute itself.  I have Googled and read many discussions, but never found out a specific answer to my question.

The share I am talking about is a data share; the entire drive is NOT shared ,and the OS directories (including OS extensions by installed programs) are not shared.  Clearly, if I share the entire drive, or the OS or Program directory,  an OS or program DLL or EXE can be replaced, and eventually executed by normal calls from the OS.

Possibly the problem is the terms used, spread and infection are being used interchangeably.  In my mind, spreading means the virus payload is being placed on a device, such as a removable storage or shared network directory, but is not active. Infected to me means the virus is active. If a virus just spreads, a good and up-to-date pre-execution virus scanner will block infection.

What concerns me is the implication that a virus can push itself from one machine to another and infect that machine without overt user action on the targeted machine, i.e., not just place a copy of the payload in the shared directory, but actually remotely cause the activation of that payload.

Any insight into this mechanism of infection would be appreciated.

Question by:pluskey
  • 2
  • 2
LVL 15

Expert Comment

Comment Utility

Some viruses or worms are being programmed to spread through networks by exploiting X vulnerability in the system. So, once the exploit is successfully executed remotely, the virus's payload will be transfered to the infected machine and get unpacked and decrypted in memory.

Windows admin shares (ADMIN$, C$, IPC$, D$..etc) are used to access and penetrate systems remotely, a virus only needs to infect one system running using a domain privileged account (ex. Domain Administrator) to able to access all systems in the network. That's why we encourage users to be wise when they want to use such powerful privilege.

You need to use shared folders permissions, and auditing to protect against infections. Read-only permission will prevent writing inside these folders (ex. Autorun.inf) or modifying any executable files.

A Symantec Certified Specialist @ your service

Author Comment

Comment Utility
Xmachine, thank you for your reply,but I am still confused by the situation.

If I understand you correctly, a networked windows machine with an open share can have a remote execution forced upon it using this X vulnerability.  Can you describe, or give reference to, this vulnerability?  

I Googled  X vulnerability, and only found referenced dated later than 2006 in unpatched windows XP systems, so I didn't find help there. I have found references to Active-X vulnerabilities, not X vulnerability.

I also have been disabling autorun since before XP, because having that enabled seemed to me asking for trouble.  Is that part of the security hole being referenced?

Once again,thank you for your reply.
LVL 15

Accepted Solution

xmachine earned 125 total points
Comment Utility
Sorry, there is no Windows vulnerability called X, I used it for the example only. There are a lot of vulnerabilities that would fit here.

For example,

Author Comment

Comment Utility
Thank you for the information and education.  I was completely unaware that Microsoft OS can be exploited by completely remote means, as opposed by trickery of an unsuspecting user.  If I understand your reference, the exploit employs access through a specific TCP port which is used for some Microsift-centric operation to induce remote code operation without any user intervention.  

While I understood the buffer overflow type exploits, I did not know legal command driven exploits existed.

Featured Post

Highfive Gives IT Their Time Back

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

OVERVIEW This guide provides information on the process performed when the Symantec Endpoint Protection (SEP) client checks in with the Symantec Endpoint Protection Manager (SEPM). AUDIENCE Information Technology personnel responsible for suppo…
PREFACE The purpose of this guide is to provide information to successfully install the MS SQL client tools for the Symantec Endpoint Protection Manager (SEPM) to function properly when installed on Windows 2008. AUDIENCE Information Technology…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now