Security Incidents mailing list archives

Re: Wave of Nimda-like hits this morning?


From: "security" <security_traq () hotmail com>
Date: Tue, 26 Feb 2002 20:14:46 -0500

the GET command your recieving is an old decode exploit thats still
vulnerable as far as i am aware(iis4.0+). it allows any user to run programs
as IUSR_MACHINENAME on windows boxes. so if they did something like:
http://www.yoursite.com/msadc/..%255c..%255c..%255c..%255cwinnt/system32/cmd
.exe?/c+dir+c:\
(the %5c../ are just %255c broke down by the server)
you would get a listing of C:\. I've written a proof of concept to test
machines with  http://statik.countercultured.net

----- Original Message -----
From: "Ralph Los" <RLos () enteredge com>
To: <incidents () securityfocus com>
Sent: Tuesday, February 26, 2002 9:46 AM
Subject: Wave of Nimda-like hits this morning?


Hey,
I've had multiple clients' Solaris boxes crashing this morning from
what appears to be a Nimda-like 'scripts/..%5c../root.exe', and the usual.
The same old unicode characters are present [%2f, %5c] but a new one has
appeared I haven't seen yet.  This line:

'
/msadc/..%5c../..%5c../..%5c/..Á../..Á../..Á../winnt/system32/cmd.exe '

appears a few times and I'm not quite sure what to make of it...

Please keep in mind that came from a Solaris box, Apache log.
Whatever this (maybe) new bug is, it's blowing up these boxes left and
right...can't figure it out.  They're all relatively new 1.3'ish versions I
think.

Anyone else seeing anything weird?

----------------------------------------|
Ralph M. Los
Sr. Security Consultant and Trainer
          EnterEdge Technology, L.L.C.
          rlos () enteredge com
          (770) 955-9899 x.206
----------------------------------------|


----------------------------------------------------------------------------
This list is provided by the SecurityFocus ARIS analyzer service.
For more information on this free incident handling, management
and tracking system please see: http://aris.securityfocus.com



----------------------------------------------------------------------------
This list is provided by the SecurityFocus ARIS analyzer service.
For more information on this free incident handling, management 
and tracking system please see: http://aris.securityfocus.com


Current thread: