Risk
2/9/2009
06:20 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Windows Worm Didn't Ground French Planes, Official Claims

The planes had been grounded following a Conflicker worm infection that had spread last month throughout the French nonsecured internal naval network called Intramar.

French navy officials suspect than an infected USB drive is to blame for a Conflicker/Downandup worm infection last month that interfered with the operation of naval logistics systems running Microsoft Windows.

But a French defense ministry spokesperson has denied reports that the worm grounded French navy jets, as claimed in The Telegraph and several French publications.

Citing a French intelligence publication, Intelligence Online, The Telegraph in the United Kingdom reported on Saturday that the Rafale, a plane used in the French navy, had been grounded following a Conflicker worm infection that had spread last month throughout the French nonsecured internal naval network called Intramar. The worm supposedly interfered with French navy's ability to transfer flight data to its planes.

In October, Microsoft issued an out-of-band Security Bulletin, MS08-067, for a vulnerability affecting its Server service. It warned that the vulnerability was "potentially wormable." As Microsoft feared, the vulnerability was wormable and the worm that was released, known as Conflicker or Downandup, and its variants, affected at least 9 million PCs last month.

According to French newspaper Ouest France, the worm's impact on Intramar forced the French navy to "return to conventional means of communication such as telephone, fax, or regular mail" while the infection was mitigated.

Jerome Erulin, a spokesperson for the French navy, said the incident served as an exercise and that it affected communication but resulted in no data loss.

And in keeping with a long tradition of Anglo-Gallic rivalry, Ouest France observed, "The only consolation for the [French] navy is that it is not alone in facing such problems." Its report notes that DefenseTech.org last month said that the U.K. Ministry of Defense had begun investigating what appeared to be a major worm-driven breach affecting over 24 RAF bases and 75% of Royal navy ships."

The Telegraph, in its article on the French security incident, reported the finger-pointing of the French press without comment.

Besides the Conflicker/Downandup worm infection, what other security threats are deemed most serious? InformationWeek polled more than 400 business technology professionals to find out. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7912
Published: 2015-07-29
The get_option function in dhcp.c in dhcpcd before 6.2.0, as used in dhcpcd 5.x in Android before 5.1 and other products, does not validate the relationship between length fields and the amount of data, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory c...

CVE-2014-7913
Published: 2015-07-29
The print_option function in dhcp-common.c in dhcpcd through 6.9.1, as used in dhcp.c in dhcpcd 5.x in Android before 5.1 and other products, misinterprets the return value of the snprintf function, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory corru...

CVE-2015-2977
Published: 2015-07-29
Webservice-DIC yoyaku_v41 allows remote attackers to create arbitrary files, and consequently execute arbitrary code, via unspecified vectors.

CVE-2015-2978
Published: 2015-07-29
Webservice-DIC yoyaku_v41 allows remote attackers to bypass authentication and complete a conference-room reservation via unspecified vectors, as demonstrated by an "unintentional reservation."

CVE-2015-2979
Published: 2015-07-29
Webservice-DIC yoyaku_v41 allows remote attackers to execute arbitrary OS commands via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
What’s the future of the venerable firewall? We’ve invited two security industry leaders to make their case: Join us and bring your questions and opinions!