Sasser Virus Information
Hi All, Sasser seems to be alive and well, here is some information that you may find useful. -- Based on the information at the Symantec link: - Blocking destination tcp ports 5554 and 9996 at the routers will stop the payload being transferred across network segments. (5554 appears to be the content transfer channel (FTP), 9996 is the remote shell used to run commands on a host). - Deploying an IPSec policy with filter actions for Block on port 5554 and 9996 can be used to block the transfer of the payload to or from individual hosts. Blocking inbound 445 is also possible, but may cause problems depending on your specific requirements re File and Print sharing on clients. NB This is a technique to limit the spread of the virus, not to mitigate the vulnerability. -- Group Policy deployment of the removal tool has not been tested to my knowledge, but: - When assigned to a computer, the package is executed using a Local System logon, so shouldn't encounter any permissions issues. - The cleanup tool fails if the MS04-011 hotfix is not installed. - Group Policy does not guarantee an order of completion for assigned packages. - If the package runs unsuccessfully, it may not be run again by the software deployment engine; instead, consider using MSI to get the cleanup tool onto the workstations and a computer startup script to execute the tool. - Our typical suggestion is to install MS04-011, reboot, then run the cleanup tool; GP software deployment may not be able to accomplish this in a single step.
participants (1)
-
Nick MacKechnie (thenet)