Short Name |
WORM:SASSER:A-D-F-FTP-DL-5554 |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
WORM |
Keywords |
Sasser A/B/C/D/F FTP Download (5554) |
Release Date |
2004/05/01 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects successful connection attempts to a Sasser.A, B, C, D, or F FTP server running on port 5554. Sasser uses this FTP server to propagate its infection by downloading the worm binary to the FTP client. If you see this signature detected, it almost certainly means that the client has just been infected with Sasser and that the server is infected and is actively spreading this worm.
Microsoft Windows LSASS (Local Security Authority Subsystem Service) is prone to a remotely exploitable buffer overrun vulnerability. The specific vulnerable system component is LSASRV.DLL. Successful exploitation of this issue could allow a remote attacker to execute malicious code on a vulnerable system, resulting in full system compromise. This issue could be exploited by an anonymous user on Microsoft Windows 2000 and XP operating systems. The issue may reportedly only be exploited by local, authenticated users on Microsoft Windows Server 2003 and Microsoft Windows XP 64-Bit Edition 2003. Microsoft has stated that a local administrator could exploit the issue on these platforms, though this does not appear to pose any additional security risk as the administrator will likely already have complete control over the system.