Snort mailing list archives

Re: IDS553/web-iis_IIS ISAPI Overflow idq


From: Ryan Russell <ryan () securityfocus com>
Date: Wed, 15 Aug 2001 10:55:15 -0600 (MDT)

On Wed, 15 Aug 2001 john.ruff () us abb com wrote:



One of the rules I'm using for Code Red is generating alerts that seem to be
false, rather I'm not sure their reliable.

Rule from Whitehats.com:
alert TCP $EXTERNAL any -> $INTERNAL 80 (msg: "IDS553/web-iis_IIS ISAPI Overflow
idq";
dsize: >239; flags: A+; uricontent: ".idq?"; classtype: system-or-info-attempt;
reference: arachnids,553;)

There is not enough information in what you sent to determine what is
going on.  Can you grep your web server logs for that day for '.idq?' and
send those?  That's the only way your going to determine if it is a false
alarm, whether the attack worked, etc..

In general, the rule is well-written.  It only goes off for requests
involving idq, and that exceed the normal request size.  Note that the
.ida version of this rule has been going off left and right due to Code
Red.

                                        Ryan


_______________________________________________
Snort-users mailing list
Snort-users () lists sourceforge net
Go to this URL to change user options or unsubscribe:
http://lists.sourceforge.net/lists/listinfo/snort-users
Snort-users list archive:
http://www.geocrawler.com/redir-sf.php3?list=snort-users


Current thread: