Other
Code Red IIS Buffer Overflow Worm (359K Hosts, $2.6B Damages)
Primary Source βIncident Details
Code Red exploited a buffer overflow in the IDQ.DLL component of Microsoft IIS web server software (documented in MS01-033). The worm required no user interaction β it scanned random IP addresses and automatically exploited unpatched IIS servers. At peak on July 19, 2001, Code Red infected 359,000 hosts and was spreading at over 2,000 new infections per minute. The worm defaced infected websites with ‘Hacked By Chinese’ and launched a coordinated DDoS attack against the White House website (www.whitehouse.gov) on the 20th of each month β a hardcoded target that the White House preemptively changed its IP address to avoid. A second variant (Code Red II) installed a backdoor for remote access. Estimated damages: $2.6 billion. The worm demonstrated the catastrophic speed at which internet-facing vulnerabilities could be weaponized at scale and drove adoption of automatic patch deployment by organizations worldwide.
Technical Details
- Initial Attack Vector
- Buffer overflow vulnerability in Microsoft IIS 4.0/5.0 Index Server (MS01-033 / CVE-2001-0500); patch available one month prior; worm propagated by scanning random IP addresses and exploiting unpatched IIS servers with no user interaction
- Vendor / Product
- Microsoft IIS (Internet Information Services)
- Malware Family
- Code Red (W32/CodeRed)
- CVE / GHSA References
- CVE-2001-0500
Timeline
- 2001-07-13 Breach occurred
- 2001-07-19 Publicly disclosed