Skip navigation

Attack Shield Worm Suppression

Sana Security's Attack Shield Worm Suppression (WS) is a software-only solution to protect workstations from worms that spread via buffer-overflow attacks. The software operates only when an exploit makes a system call. So although it prevents exploits from using a buffer overflow for actions such as privilege escalation and file-system access, it won't protect against buffer overflows that cause a crash by corrupting memory.

I tested Attack Shield WS on both Windows XP and Windows 2000 Professional machines by using vulnerability-testing tools Metasploit and SMBdie to exploit three well-known Windows buffer-overflow vulnerabilities. I attempted to add a user with Metasploit by exploiting the vulnerabilities described in Microsoft Security Bulletins MS04-011 and MS03-026, and I crashed my system with SMBdie using the vulnerability described in MS02-045. Attack Shield WS successfully stopped the first two attacks, but it failed to thwart the third because SMBdie doesn't attempt a system call.

Attack Shield WS protects the default listening TCP/IP services on XP and Win2K (listed in Web Table 1, http://www.windowsitpro.com, InstantDoc ID 45607). It might not stop a machine from crashing, but it stops worms from using an exploited machine to spread. Although I'd like to see Sana Security test and support more services, such as the Microsoft SQL Server Desktop Engine (MSDE), the defaults are probably sufficient for most environments. If you don't need additional services on your workstations, Attack Shield WS is a nice complement to antivirus software.



Attack Shield Worm Suppression
Contact: Sana Security * 650-292-7100 or 866-900-7262
Web: http://www.sanasecurity.com
Price: $9.95 per individual license; $796 for a 100-license pack
Summary
Pros: Simple and effective; no updates or signatures to install
Cons: A limited number of Windows services are tested and supported
Rating: 3 out of 5
Recommendation: A good complement to antivirus software if workstation downtime is unacceptable.


Web Table 1: Default Listening Ports
XP SP2
Protocol Port Binary Attack Shield WS–Protected Process
TCP 135 svchost.exe Generic Windows Services
TCP 139 System* Generic Windows Services
TCP 445 System Generic Windows Services
UDP 123 svchost.exe Generic Windows Services
UDP 137 System Generic Windows Services
UDP 138 System Generic Windows Services
UDP 445 System Generic Windows Services
UDP 500 lsass.exe LSA Shell Manager
UDP 1025 svchost.exe Generic Windows Services
UDP 1026 svchost.exe Generic Windows Services
UDP 1900 svchost.exe Generic Windows Services
UDP 4500 lsass.exe LSA Shell Manager
Win2K Pro SP3
TCP 135 svchost.exe Generic Windows Services
TCP 139 System Generic Windows Services
TCP 445 System Generic Windows Services
TCP 1025 mstask.exe Task Scheduler
TCP 1026 System Generic Windows Services
TCP 1029 System Generic Windows Services
UDP 135 svchost.exe Generic Windows Services
UDP 137 System Generic Windows Services
UDP 138 System Generic Windows Services
UDP 445 System Generic Windows Services
UDP 500 lsass.exe LSA Shell Manager
UDP 1029 services.exe Services Manager


Hide comments

Comments

  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
Publish