![]() |
Sql
Long story short, if your sponsor uses Microsoft SQL for their DB backend, don't expect to get paid on time this month.
|
why, is all of SQL whiped out?
|
It's a worm exploiting bugs in Microsoft's SQL server, but it's people's own fault for not patching 6 MONTHS AGO when Microsoft released patches.
|
Quote:
|
Quote:
|
Quote:
|
Quote:
i doubt the data is gone, but some people will be totally fucked come bandwidth bill time. told people before to keep current on patches, but ya'll fuckers don't listen. now there is cost associated, maybe some will. t |
This patch was released in July of last year.
This cycle will continue to consume server and network resources until one of the servers stops sending packets for one of several reasons, including a restart of the SQL Server, a reboot of the server host, or a network failure. Basically this exploit causes MS servers to ping each other back and forth, using up system resources on the servers. Once the attack is stopped the machine should be fine. This expoit is not supposed to wipe anything out, just bog it down to a standstill. |
Quote:
UDP packets not icmp. and heres the CERT advisory on this fucker: http://www.kb.cert.org/vuls/id/370308 |
Quote:
aware of that. report i saw said a fairly large ping, then a nice udp flood. |
are you trying to create panic?
Why the hell would this have anything to do with payouts? There are workarounds.. They need to get the patch and block the UDP port that's being attacked. It has nothing to do with payouts.. |
Quote:
|
Payouts should be fine once this attack is stopped. Over the next 12 hours the majority of admins around the world who have MS servers should be getting the patch and fixing the problem. This exploit does not erase any info, it only causes MS servers to ping each other back and forth and use system resources till the server is bogged down. The increase in traffic has slowed some networks and providers down. Over the next 12 hours it should get much better. Pretty interesting that is started late on a Friday night. A lot of admins are going to be waking up in the morning shitting their pants.
|
So how exactly do you track signups when your SQL servers are pumping 100Mbps on your FastEthernet port? Magical backdoor? Trapdoor in the floor? Psychokinetic packet reprioritization?
|
Quote:
most systems dont use MS SQL which is the only thing affected. |
Quote:
Brad |
AMAZINGLY thehun.net is using MS sql..... wholly muthafucking sql DB errors batman, just "try" to submit a gallery. :winkwink:
|
Quote:
|
Quote:
|
Quote:
Are you ready to stop being a jerky ass? :) |
I was talking about infected servers PUSHING traffic out, not reception of packets from infected servers, but who cares now, most of it has seemed to subside.
|
WASHINGTON (Jan. 25) - Traffic on the Internet slowed dramatically for hours early Saturday, the effects of a fast-spreading, virus-like infection that overwhelmed the world's digital pipelines and broadly interfered with Web browsing and delivery of e-mail.
Sites monitoring the health of the Internet reported significant slowdowns globally. Experts said the electronic attack bore remarkable similarities to the ''Code Red'' virus during the summer of 2001 which also ground online traffic to a halt. ''It's not debilitating,'' said Howard Schmidt, President Bush's No. 2 cyber-security adviser. ''Everybody seems to be getting it under control.'' Schmidt said the FBI's National Infrastructure Protection Center and private experts at the CERT Coordination Center were monitoring the attack and offering technical advice to computer administrators on how to protect against it. Most home users did not need to take any protective measures. The virus-like attack, which began about 12:30 a.m. EST, sought out vulnerable computers on the Internet to infect using a known flaw in popular database software from Microsoft Corp., called ''SQL Server 2000.'' But the attacking software code was scanning for victim computers so randomly and so aggressively - sending out thousands of probes each second - that it saturated many Internet data pipelines. Schmidt said disruption within the U.S. government was minimal, partly because the attack occurred early on a Saturday morning. ''This is like Code Red all over again,'' said Marc Maiffret, an executive with eEye Digital Security, whose engineers were among the earliest to study samples of the attack software. ''The sheer number of attacks is eating up so much bandwidth that normal operations can't take place.'' ''The impact of this worm was huge,'' agreed Ben Koshy of W3 International Media Ltd., which operates thousands of Web sites from its computers in Vancouver. ''It's a very significant attack.'' Koshy added that, about six hours after the attack started, commercial Web sites that had been overwhelmed were starting to come back online as engineers began effectively blocking the malicious data traffic. At the height of the attack, another company reported that computers were flooded with more than 125 megabytes of data every second. ''People are recovering from it,'' Koshy said. Symantec Corp., an antivirus vendor, estimated that at least 22,000 systems were affected worldwide. ''Traffic itself seems to have leveled off a little bit, so likely only so many systems are exposed out there,'' said Oliver Friedrichs, senior manager with Symantec Security Response. The attacking software, technically known as a worm, was overwhelming Internet traffic-directing devices known as routers. ''The Internet is still usable, but we're definitely receiving reports from some of our customers who have had it affect their routers specifically,'' Friedrichs said. The attack sought to exploit a software flaw discovered by researchers in July 2002 that permits hackers to seize control of corporate database servers. Microsoft deemed the problem ''critical'' and offered a free repairing patch, but it was impossible to know how many computer administrators applied the fix. ''People need to do a better job about fixing vulnerabilities,'' Schmidt said. The latest attack was likely to revive debate within the technology industry about the need for an Internet-wide monitoring center, which the Bush administration has proposed. Some Internet industry executives and lawyers said they would raise serious civil liberties concerns if the U.S. government, not an industry consortium, operated such a powerful monitoring center. ''No where do you see everything that has happened in cyber-space, no one has that synoptic view,'' said Dick Clarke, Bush's top cyber-security adviser, during a speech earlier this month to U.S. intelligence officials. ''What we're talking about is seeing something in time to stop it, a major cyber attack.'' During the ''Code Red'' attack in July 2001, about 300,000 mostly corporate server computers were infected and programmed to launch a simultaneous attack against the Web site for the White House, which U.S. officials were able to defend successfully. Unlike that episode, the malicious software used in this latest attack did not appear to do anything other than try to spread its own infection, experts said. On the Net: Technical details: http://www.microsoft.com/technet/tre...url=/technet/s ecurity/ http://www.eeye.com/html/Research/Flash/AL20030125.html Microsoft fix: bulletin/MS02-039.asp AP-NY-01-25-03 0820EST Copyright 2003 The Associated Press. The information contained in the AP news report may not be published, broadcast, rewritten or otherwise distributed without the prior written authority of The Associated Press. All active hyperlinks have been inserted by AOL. |
| All times are GMT -7. The time now is 12:09 PM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123