Security Incidents mailing list archives
Re: CodeRedII worm..
From: Pluto <pluto () stderr de>
Date: Sun, 5 Aug 2001 20:23:51 +0200
On Sun, Aug 05, 2001 at 04:38:55AM -0400, Valdis.Kletnieks () vt edu wrote:
(Sorry for the cross-posting) Given that initial analysis of the CodeRedII worm indicates that it leaves a backdoor laying around, I hereby request that those people who made lists of infected hosts available last time *NOT* do so again.
I have seen no checks for root.exe so far. But Nessus already has a codered_x.nasl, congrats to this speed! # special root.exe from CR2 alert tcp any any -> any 80 (msg: "CodeRedII root.exe"; flags: A+; content:"root.exe"; depth:624; classtype:attempted-admin;) Gruss -- Pluto - SysAdmin of Hades Free information! Freedom through knowledge. Wisdom for all!! =:-) PGP 1024/7261AACD 1996/09/10 1F3F EA94 D056 A686 4D19 C456 6CF9 4344 Phone: +49-173-4814739 eCash(DB): 129429938818 Q3T: js-Pluto ---------------------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
Current thread:
- CodeRedII worm.. Valdis . Kletnieks (Aug 05)
- Re: CodeRedII worm.. Pluto (Aug 05)
- Re: CodeRedII worm.. A.L.Lambert (Aug 05)
- Re: CodeRedII worm.. Nick FitzGerald (Aug 06)
- Re: CodeRedII worm.. Nick FitzGerald (Aug 06)
- Re: CodeRedII worm.. Emory Wood (Aug 06)
- Re: CodeRedII worm.. Pluto (Aug 05)