Sasser shows need for quick patch response

Last week's Sasser worm outbreak, which disrupted operations at some businesses while leaving most virtually untouched, highlighted the difference a good vulnerability management strategy can make to a company's defenses, users and analysts said.

The W32/Sasser worm started spreading on April 30, and by the middle of last week, it had infected hundreds of thousands of systems globally.

The worm took advantage of a flaw in a Windows security and authentication component that Microsoft Corp. disclosed on April 13. Microsoft released a patch to fix the problem on the same day, and since then, the company and several security experts have been urging users to install the update as soon as possible.

The fact that the worm managed to infiltrate some corporate networks despite the warnings shows that there is still progress to be made in promptly responding to such vulnerabilities, said Art Manion, a member of the CERT Coordination Center at Carnegie Mellon University.

"Some organizations have streamlined patching and policy management to roll out important updates in a matter of days," said Ken Dunham, an analyst at Reston, Va.-based iDefense Inc. "Others are so careful and test so many features that they end up being vulnerable for an extended period of time."

A large majority of those infected last week were believed to be home users. But several large organizations were hit as well, including American Express Co. in New York. An Amex spokeswoman said that "some employee desktops" were affected by the worm. "But we never had any issues with our networks or service," she added.

"This was a big one. But I am amazed that it got as far as it did," said Firas Rouf, chief operating officer at eEye Digital Security, an Aliso Viejo, Calif.-based provider of vulnerability assessment services.

Several users said companies would have been protected if they had followed long-recommended security measures, such as knowing where vulnerabilities exist, prioritizing threats and responses, applying appropriate patches, keeping antivirus software up to date, blocking unused ports and installing firewalls on end-user desktops.

TRW Automotive Holdings Corp. in Livonia, Mich., escaped Sasser thanks largely to new patch management software that it had just finished deploying across 22,500 systems globally. The software from Emeryville, Calif.-based BigFix Inc. helped TRW identify vulnerable systems and deploy patches to them in an automated fashion.

"The big thing was the speed with which we were able to deploy patches to our desktops," said Bill Blix, TRW's global infrastructure vulnerability manager.

Proactive approach

Meanwhile, software- and hardware-based firewalls installed on every end-user system protected St. Louis-based Tripos Inc. against Sasser.

As soon as the drug research firm heard of the vulnerability, it changed the settings on those firewalls to proactively block any attacks, said Jerry Wintrode, senior network architect at Tripos.

It also changed the settings on a policy enforcement server at the edge of its networks so that it would automatically shut out any remote system that might have somehow been infected, Wintrode said.

Attackers are getting quicker and more efficient at taking advantage of new flaws. Last year's damaging Blaster worm -- which Sasser was compared to -- took about a month to hit the Internet after the flaw it exploited was first announced. In contrast, Sasser took less than three weeks.

Patches and work-arounds can be faulty or break existing applications and need to be carefully tested before they are deployed. Companies also need to make more of an effort to ensure that systems belonging to mobile and home-based users don't infect otherwise clean networks. But a plethora of tools are becoming available today that are making the task more manageable, Rouf said.

"It's not easy," he said. "On the other hand, it's not as hard as it used to be."

Join the newsletter!

Error: Please check your email address.

More about American Express AustraliaCarnegie Mellon University AustraliaCERT AustraliaeEye Digital SecurityiDefenseMellonMicrosoftTriposTRW

Show Comments

Market Place

[]