> Data > SQL Slammer worm

SQL Slammer worm

Data - Par iTPro.fr - Publié le 24 juin 2010
email

Mis en ligne le 29/01/2003
Retrouvez les dernières informations sur le Worm "SQL Slammer", publiées par Microsoft à  la suite des incidents des 25/26 Janvier 2003. (Articles en anglais)

SQL Slammer worm

To our customers:

On the evening of Friday January 24, 2003 Microsoft became aware of an Internet attack that was causing a dramatic increase in network traffic worldwide. We immediately began investigating the issue and learned that a worm, named Sapphire or Slammer, was targeting computers running Microsoft® SQL Server™ 2000 and MSDE 2000 systems. We were quickly able to determine that (a) the vulnerability was known and patches had previously been made available, and (b) there was no data corruption on customers’ systems. The release of this worm is a criminal act, and we are working with law-enforcement authorities to the fullest extent possible.

We understand this worm has caused business disruption and we are committed to help our customers make sure their networks are as secure as possible from development through deployment.

Since the release of this worm, Microsoft has worked around the clock to pull together the information and resources necessary to ensure that customers are able to protect their affected systems. Complete information is located at http://Microsoft.com/security. We have extra staff on hand in Product Support to assist customers, and, of course, all support calls related to this issue are free of charge.

The vulnerability that is exploited by this worm was first addressed by a Microsoft security patch in July 2002 and in subsequent cumulative patches, most recently in October 2002. In addition, as part of our commitment to the secure in deployment goal of Trustworthy Computing, we have re-released the latest security patch to include an installer that makes it easier for system administrators to accelerate installation.

Going forward, Microsoft will continue to invest in developing a more secure and robust computing infrastructure as part of the Trustworthy Computing initiative. We will also work with network administrators to continue to improve our patch deployment process.

We realize that SQL Server is a critical component of our customer’s enterprise infrastructure. As a result, Microsoft recently executed a security push to proactively identify and remove security flaws in SQL Server 2000. These updates were recently delivered as part of SQL Server 2000 and MSDE 2000 service pack 3. Security pushes like this are part of our commitment to delivering on the vision of TWC by making our exiting products more secure by design, default and in deployment. As a result, we strongly recommend that you evaluate and adopt SQL Server service pack 3.

Trustworthy Computing is a long-term process and this latest incident reinforces both how reliant we are on the Internet and how much work remains to deliver security against malicious attacks such as this. We understand the importance of this issue and we continue to look for new ways to deliver quality updates in a timely and easy to deploy manner.

Téléchargez cette ressource

Guide de cybersécurité en milieu sensible

Guide de cybersécurité en milieu sensible

Sur fond de vulnérabilités en tout genre, les établissements hospitaliers, pharmacies, laboratoires et autres structures de soin font face à des vagues incessantes de cyberattaques. L’objectif de ce livre blanc est de permettre aux responsables informatiques ainsi qu’à l’écosystème des sous-traitants et prestataires du secteur médical de se plonger dans un état de l’art de la cybersécurité des établissements de santé. Et de faire face à la menace.

Data - Par iTPro.fr - Publié le 24 juin 2010