nanog mailing list archives
Re: RPC errors
From: Jack Bates <jbates () brightok net>
Date: Mon, 11 Aug 2003 15:51:57 -0500
Sean Donelan wrote:
http://isc.sans.org/diary.html?date=2003-08-11 The worm uses the RPC DCOM vulnerability to propagate. One it finds a vulnerable system, it will spawn a shell and use it to download the actual worm via tftp. The name of the binary is msblast.exe. It is packed with UPX and will self extract. The size of the binary is about 11kByte unpacked, and 6kBytes packed:
That shows what I'm seeing. 10% of all outbound packets are tcp/135. Currently blocked both directions at edges in my network until further notice. Keeping an eye on other ports, but this is the only one causing any amount of load to draw concern.
-Jack
Current thread:
- RPC errors Jack Bates (Aug 11)
- Re: RPC errors Sean Donelan (Aug 11)
- Re: RPC errors Jack Bates (Aug 11)
- Re: RPC errors Dominic J. Eidson (Aug 12)
- Re: RPC errors Crist Clark (Aug 12)
- Re: RPC errors Dominic J. Eidson (Aug 12)
- Re: RPC errors Jack Bates (Aug 11)
- Re: RPC errors Chris Reining (Aug 11)
- Re: RPC errors Sean Donelan (Aug 11)
- Re: RPC errors /m (Aug 11)
- Re: RPC errors william (Aug 11)
- <Possible follow-ups>
- RE: RPC errors Drew Weaver (Aug 11)
- RE: RPC errors McBurnett, Jim (Aug 11)
- RE: RPC errors Mike Damm (Aug 11)
- RE: RPC errors Kevin Houle (Aug 11)