Morris Worm - Architecture of The Worm

Architecture of The Worm

According to its creator, the Morris worm was not written to cause damage, but to gauge the size of the Internet. However, the worm was released from MIT to disguise the fact that the worm originally came from Cornell. Additionally, the Morris worm worked by exploiting known vulnerabilities in Unix sendmail, finger, and rsh/rexec, as well as weak passwords. Due to reliance on rsh (normally disabled on untrusted networks) it should not succeed on a recent, properly configured system.

A supposedly unintended consequence of the code, however, caused it to be more damaging: a computer could be infected multiple times and each additional process would slow the machine down, eventually to the point of being unusable. This would have the same effect as a fork bomb and crash the computer. The main body of the worm could only infect DEC VAX machines running 4BSD, and Sun-3 systems. A portable C "grappling hook" component of the worm was used to pull over (download) the main body, and the grappling hook could run on other systems, loading them down and making them peripheral victims.

Read more about this topic:  Morris Worm

Famous quotes containing the words architecture and/or worm:

    The principle of the Gothic architecture is infinity made imaginable.
    Samuel Taylor Coleridge (1772–1834)

    A worm is as good a traveler as a grasshopper or a cricket, and a much wiser settler. With all their activity these do not hop away from drought nor forward to summer. We do not avoid evil by fleeing before it, but by rising above or diving below its plane; as the worm escapes drought and frost by boring a few inches deeper.
    Henry David Thoreau (1817–1862)