CERT Coordination Center 2000 Annual Report

Annual Report
By
This 2000 report provides an overview of CERT Coordination Center incident handling, vulnerability analysis, publications, training, and community events.
Publisher

Software Engineering Institute

Abstract

From January through December 2000, the CERT/CC received 56,365 email messages and more than 1,280 hotline calls reporting computer security incidents or requesting information. We received 774 vulnerability reports and handled 21,756 computer security incidents during this period. More than 9,350,0001 hosts were affected by these incidents.

Some of the most serious intruder activities reported to the CERT/CC in 2000 were:

  • Distributed Denial of Service (DDoS)
    The year began with extensive denial-of-service attacks using tools that take advantage of the distributed nature of the Internet. In addition to continued reports of denial-of-service problems, a denial-of-service tool called "stacheldraht" was discovered (CA-2000-01), which elaborated on and supplemented information released in an earlier denial-of-service advisory (CA-1999-17).
  • BIND
    Intruders root compromised systems through vulnerabilities in BIND including the "NXT bug" described in advisory CA-1999-14. The CERT/CC published advice on protecting systems that run BIND nameservers in CA-1999-14 and CA-200003.
  • FTP
    Intruders exploited vulnerabilities in WU-FTPD and other FTP daemons to gain root access. They scanned large network blocks searching for vulnerable machines and used automated tools to compromise the ones they found. In some cases, the intruder tool included a denial-of-service tool, a password sniffer, and more.
  • rcp.statd
    Intruders used vulnerabilities in rpc.statd to gain root access and execute programs of their choice. As with the FTP exploitations, intruders performed widespread scans for this vulnerability and used toolkits to automate their attacks on vulnerable machines. As a result, they were able to compromise hundreds of hosts in a single incident. (CA-2000-17 and IN-2000-10).
  • ActiveX Controls
    In 2000, we received reports of email-borne viruses that exploit a vulnerability in the Microsoft ActiveX control named "Scriptlet.Typelib." This ActiveX control allows local files to be created or modified, so it is unsafe to allow untrusted programs to access this control (IN-2000-06). Additionally, we published information about a serious vulnerability in the HHCtrl ActiveX control. This vulnerability allows remote intruders to execute arbitrary code, if the intruder can cause a compiled help file (CHM) to be accessed locally (CA-2000-12).
  • "Love Letter"
    A malicious VBScript program that spreads in a variety of ways. In addition to damage caused by "Love Letter," some sites suffered considerable network degradation as a result of mail, file, and web traffic generated as a result of "Love Letter." The CERT/CC published details in CERT advisory CA-200004.
Part of a Collection

CERT Annual Reports 1994-2010

Cite This Annual Report

@techreport{Citekey_2001,
author={Software Engineering Institute},
title={CERT Coordination Center 2000 Annual Report},
month={{Apr},
year={{2001},
howpublished={Carnegie Mellon University, Software Engineering Institute's Digital Library},
url={https://www.sei.cmu.edu/library/cert-coordination-center-2000-annual-report/},
note={Accessed: 2026-May-15}
}

Software Engineering Institute. "CERT Coordination Center 2000 Annual Report." Carnegie Mellon University, Software Engineering Institute's Digital Library. Carnegie Mellon's Software Engineering Institute, April 6, 2001. https://www.sei.cmu.edu/library/cert-coordination-center-2000-annual-report/.