Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

1/21/2009
01:26 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Downadup Worm Invading 1 Million PCs Per Day, Disables Agent-Based Security Solutions

Shavlik offers webinar to illustrate why agentless technology is best protection against Conficker worm

ST. PAUL, Minn., Jan. 21, 2009 -- Shavlik Technologies, LLC, the market leader in simplifying, automating and accelerating security and compliance readiness, today commented on the new variant of the Conficker worm known as 'Downadup.' Shavlik reports that the company's NetChk Protect customers can and have protected themselves from this worm, but for organizations that rely on other agent-based patch management solutions, such as Windows Update, if already infected, they may be unable to apply the patch.

Downadup is yet another exploit of a security vulnerability that could be eliminated by application of MS08-067, which Microsoft released out-of-band in October 2008. To protect networks from this potential threat, IT departments must patch and configure all physical systems and virtual machines to ensure MS08-067 is deployed across the network. Continuous or on-demand security configuration assessments can provide additional defensive measures by ensuring that services like firewalls are running and that password and account policies are enforced.

"More than 9 million PCs have already been infected and IT departments cannot afford to take the risk of becoming infected and exposing confidential data," said Chris Schwartzbauer, VP Worldwide Field Operations, Shavlik Technologies. "For Shavlik customers that use NetChk Protect to scan for and patch their networks, this is a non-event. In a December survey, 90% of our customers reported they had already applied this patch. For organizations who have struggled with applying the patch, Shavlik Technologies is offering to assess their exposure to this worm at no cost, and then immediately fix their systems for a one-time, no-commitment fee."

How the Conficker and Downadup Worm Works

The worm spreads by more traditional methods of accessing computers over the Internet, but can also infect computers via malicious code on USB devices. Once infected, the worm turns off Windows Update services - thereby preventing the machine from obtaining the very patch that would have prevented the initial exploit.

The worm also denies Internet access to the websites of many different security vendors. Attempting to go to your AV or security vendor of choice to download detection or removal tools will be blocked by this worm. (The Shavlik web site is not blocked by the worm.) The worm is also known to modify the Windows firewall settings to allow access to the computer via specified ports.

Find Out More

You can access detailed commentary and analysis about Downadup from Shavlik's CTO, Eric Schultze, at: http://www.shavlik.com/desk-of-the-cto.aspx#eighteen.

Live Webinar

Register Here to learn more about the potential threat the Downadup worm poses and how to simplify deployment of MS08-067 and minimize operational impact, register for a webinar held by Shavlik Technologies' security experts on Thursday, January 22nd at 11:00am CT.

Shavlik Provides "Any Patch, Anywhere" Protection

Shavlik reports its NetChk Protect Any Patch, Anywhere technology protects its customers from this serious security vulnerability. Shavlik continues to be the industry leader in response time and support of newly available vendor patches. In addition to a solution architecture that streamlines integration of in-the-box support for new patches, Shavlik NetChk Protect also provides custom patch editor with a wizard-like interface for creating and maintaining custom patches. Combined with the Dynamic Product Detection capabilities in the NetChk Protect scan engine, customers can patch virtually any Windows application on their network.

A true enterprise solution, Shavlik NetChk Protect uses Active Vulnerability Management to simplify IT operations to maintain secure, policy-compliant networks through automatic and continuous Assessment, Remediation and Management.

About Shavlik Technologies

Shavlik Technologies, LLC delivers enterprise IT organizations robust software solutions that rapidly accelerate and continuously improve security and compliance readiness by simplifying IT operations, and identifying and reliably closing system security gaps. Shavlik's solutions provide Rapid Readiness so IT organizations realize continuous security and compliance readiness in a fraction of the time, cost and IT resources required by alternative approaches.

With more than 10,000 customers worldwide, Shavlik enables enterprises to simplify complex IT security and compliance management, providing trustworthy solutions that free up critical IT resources to focus on innovations that drive business growth while lowering costs. Shavlik also licenses its technology to more than 20 leading security and technology companies such as BMC, Juniper, Sophos, Symantec and VMware. For more information, visit Shavlik Technologies at www.shavlik.com.

Shavlik Technologies is a registered trademark in the United States and certain other countries, of Shavlik Technologies. Additional Shavlik product names are either registered trademarks or trademarks of Shavlik Technologies. All other trademarks mentioned in this document are the property of their respective owners.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
News
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
News
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18629
PUBLISHED: 2021-03-04
Xerox AltaLink B8045/B8055/B8065/B8075/B8090 and C8030/C8035/C8045/C8055/C8070 multifunction printers with software releases before 101.00x.099.28200 allow an attacker to execute an unwanted binary during a exploited clone install. This requires creating a clone file and signing that file with a com...
CVE-2019-18628
PUBLISHED: 2021-03-04
Xerox AltaLink B8045/B8055/B8065/B8075/B8090 and C8030/C8035/C8045/C8055/C8070 multifunction printers with software releases before 101.00x.099.28200 allow a user with administrative privileges to turn off data encryption on the device, thus leaving it open to potential cryptographic information dis...
CVE-2021-21331
PUBLISHED: 2021-03-03
The Java client for the Datadog API before version 1.0.0-beta.9 has a local information disclosure of sensitive information downloaded via the API using the API Client. The Datadog API is executed on a unix-like system with multiple users. The API is used to download a file containing sensitive info...
CVE-2021-27940
PUBLISHED: 2021-03-03
resources/public/js/orchestrator.js in openark orchestrator before 3.2.4 allows XSS via the orchestrator-msg parameter.
CVE-2021-21312
PUBLISHED: 2021-03-03
GLPI is open source software which stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package. In GLPI before verison 9.5.4, there is a vulnerability within the document upload function (Home > Management > Documents > Add, or /front/documen...