RE: [Declude.JunkMail] OT: Alert: New IIS Worm

2001-09-18 Thread Terrence Koeman

Sorry about the invalid certificate people...

For some reason IMAIL has to put a ">" in front of "From NTBUGTRAQ:", and
thus modifying the message.

--
Regards,

Terrence Koeman

Technical Director/Administrator
MediaMonks B.V. (www.mediamonks.nl)

Please quote all replies in correspondence.

 smime.p7s


[Declude.JunkMail] OT: Alert: New IIS Worm

2001-09-18 Thread Terrence Koeman

Offtopic

>From NTBUGTRAQ:


There have been numerous reports of IIS attacks being generated by
machines over a broad range of IP addresses. These "infected"
machines are using a wide variety of attacks which attempt to exploit
already known and patched vulnerabilities against IIS.

It appears that the attacks can come both from email and from the
network.

A new worm, being called w32.nimda.amm, is being sent around. The
attachment is called README.EXE and comes as a MIME-type of
"audio/x-wav" together with some html parts. There appears to be no
text in this message when it is displayed by Outlook when in
Auto-Preview mode (always a good indication there's something not
quite right with an email.)

The network attacks against IIS boxes are a wide variety of attacks.
Amongst them appear to be several attacks that assume the machine is
compromised by Code Red II (looking for ROOT.EXE in the /scripts and
/msadc directory, as well as an attempt to use the /c and /d virtual
roots to get to CMD.EXE). Further, it attempts to exploit numerous
other known IIS vulnerabilities.

One thing to note is the attempt to execute TFTP.EXE to download a
file called ADMIN.DLL from (presumably) some previously compromised
box.

Anyone who discovers a compromised machine (a machine with ADMIN.DLL
in the /scripts directory), please forward me a copy of that .dll
ASAP.

Also, look for TFTP traffic (UDP69). As a safeguard, consider doing
the following;

edit %systemroot/system32/drivers/etc/services.

change the line;

tftp 69/udp

to;

tftp 0/udp

thereby disabling the TFTP client. W2K has TFTP.EXE protected by
Windows File Protection so can't be removed.

More information as it arises.

Cheers,
Russ - Surgeon General of TruSecure Corporation/NTBugtraq Editor

Ok, whoa horsy, I've got lots of copies of ADMIN.DLL now thanks!

Analysis is still on-going to determine precisely what the infecting
files do (there are potentially two, ADMIN.DLL and README.EXE).

Some people have said their boxes seem unstable. It could be because
of numerous copies of TFTP.EXE in memory. At this point it might be
best to disconnect any computer that appears unstable from the
network, until such time as sufficient analysis has been performed to
advise how best to bring the box back on-line.

It is also possible for client machines to perform the attacks that
we're seeing, if you have a way to filter outbound HTTP requests you
should look for anything that contains "/scripts" or "tftp" in the
URL and treat as suspicious.

The internal threat by this one is no different (and maybe worse)
than CRII. We've seen indications of WnetEnumResource calls as well
as references to IPC$. There may be NetBIOS share activity associated
with the worm, and if so, it will likely spread rapidly internally.

More than likely you will see the biggest effect in terms of a DoS
(from many source machines). This thing cares not whether you're an
IIS box or not, it tries regardless. As this spreads the effects may
become more severe (no, I'm not going to provide a quote on how
severe). Make sure you're inbound (and preferably your outbound)
router rules are restricted to only those protocols that must be
present, and ideally to machine IP addresses that should have access.

More as it becomes available.

Cheers,
Russ - Surgeon General of TruSecure Corporation/NTBugtraq Editor

Numerous people have reported that on IIS servers infected with
w32.nimda.amm, when visitors browse to their website the visitor is
offered up README.EML, which in turn downloads README.EXE to the
visitor.

Please, check your IIS boxes now to see if you are infected. I've had
reports of IIS servers with more than 10,000 .eml files present
(mostly as a result of nimda).

While we don't have any conclusive disinfecting procedures yet, any
IIS box that has been infected definitely shouldn't be available to
clients until we do.

Cheers,
Russ - Surgeon General of TruSecure Corporation/NTBugtraq Editor



-- 
Regards,

Terrence Koeman

Technical Director/Administrator
MediaMonks B.V. (www.mediamonks.nl)

Please quote all replies in correspondence. 
 smime.p7s


Re: [Declude.JunkMail] Declude crashing and taking up 99% CPU

2001-09-18 Thread Frank

Actually, I take that back. There might be a problem with 1.24 but not with
1.23.

- Original Message -
From: "Frank" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Tuesday, September 18, 2001 9:48 AM
Subject: Re: [Declude.JunkMail] Declude crashing and taking up 99% CPU


> Scott,
> I don't remember having any problems with 1.24.
>
> - Original Message -
> From: "R. Scott Perry" <[EMAIL PROTECTED]>
> To: <[EMAIL PROTECTED]>
> Sent: Monday, September 17, 2001 5:13 PM
> Subject: Re: [Declude.JunkMail] Declude crashing and taking up 99% CPU
>
>
> >
> > >As I've stated several times: I'm not getting an error message, no
files
> are
> > >being created and no event log messages.  (I'll double check my
gigantic
> log
> > >files to be sure of the first..)
> >
> > It appears that there are 3 separate issues (you're seeing #1):
> >
> > [1] 100% CPU usage, that appears to have started between v1.20 and
> > 1.25a.  This has been narrowed down to several possible areas of code
> where
> > this is happening.  No C:\Declude.gp? file is created.
> >
> > [2] A crash, where a C:\Declude.gp? file is created.  This is happening
> > somewhere within the spam testing section of the code, but it is hard to
> > pinpoint exactly where this is happening.
> >
> > and
> >
> > [3] The known "C142" issue with user32.dll initializing, because of
> the
> > low "system heap" or whatever Microsoft is calling it.  This one can
> happen
> > with just about any version of IMail, with or without Declude, because
of
> > IMail's architecture.  There is no way to "fix" this, but we are trying
to
> > find a way to make this less noticeable when Declude is used with IMail,
> > however.
> > -Scott
> >
> > ---
> >
> > This E-mail came from the Declude.JunkMail mailing list.  To
> > unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
> > type "unsubscribe Declude.JunkMail".  You can E-mail
> > [EMAIL PROTECTED] for assistance.  You can visit our web
> > site at http://www.declude.com .
> >
>
> ---
>
> This E-mail came from the Declude.JunkMail mailing list.  To
> unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
> type "unsubscribe Declude.JunkMail".  You can E-mail
> [EMAIL PROTECTED] for assistance.  You can visit our web
> site at http://www.declude.com .
>

---

This E-mail came from the Declude.JunkMail mailing list.  To
unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
type "unsubscribe Declude.JunkMail".  You can E-mail
[EMAIL PROTECTED] for assistance.  You can visit our web
site at http://www.declude.com .



Re: [Declude.JunkMail] Declude crashing and taking up 99% CPU

2001-09-18 Thread Frank

Scott,
I don't remember having any problems with 1.24.

- Original Message -
From: "R. Scott Perry" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Monday, September 17, 2001 5:13 PM
Subject: Re: [Declude.JunkMail] Declude crashing and taking up 99% CPU


>
> >As I've stated several times: I'm not getting an error message, no files
are
> >being created and no event log messages.  (I'll double check my gigantic
log
> >files to be sure of the first..)
>
> It appears that there are 3 separate issues (you're seeing #1):
>
> [1] 100% CPU usage, that appears to have started between v1.20 and
> 1.25a.  This has been narrowed down to several possible areas of code
where
> this is happening.  No C:\Declude.gp? file is created.
>
> [2] A crash, where a C:\Declude.gp? file is created.  This is happening
> somewhere within the spam testing section of the code, but it is hard to
> pinpoint exactly where this is happening.
>
> and
>
> [3] The known "C142" issue with user32.dll initializing, because of
the
> low "system heap" or whatever Microsoft is calling it.  This one can
happen
> with just about any version of IMail, with or without Declude, because of
> IMail's architecture.  There is no way to "fix" this, but we are trying to
> find a way to make this less noticeable when Declude is used with IMail,
> however.
> -Scott
>
> ---
>
> This E-mail came from the Declude.JunkMail mailing list.  To
> unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
> type "unsubscribe Declude.JunkMail".  You can E-mail
> [EMAIL PROTECTED] for assistance.  You can visit our web
> site at http://www.declude.com .
>

---

This E-mail came from the Declude.JunkMail mailing list.  To
unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
type "unsubscribe Declude.JunkMail".  You can E-mail
[EMAIL PROTECTED] for assistance.  You can visit our web
site at http://www.declude.com .



Re: [Declude.JunkMail] ByPassing IP's

2001-09-18 Thread R. Scott Perry


>  This may be a stupid question but I can't figure it out. I would like
>Declude to bypass a certain amount of IP addresses. These are mostly
>feedbacks and e-mail forms coming from some web pages I host. When people
>receive the forms it fails the SPAMHEADERS test and gets a note. I attempted
>to put then in the WhiteLists but it doesn't do it. Am I just brain dead (
>Lately I am )

What you need to do is have a line "WHITELIST IP 127.0.0.1" (replacing 
127.0.0.1 with the IP of the mail server that is connecting to IMail), 
placed in \IMail\Declude\global.cfg.  You can have up to 100 of these lines 
in there.
-Scott

---

This E-mail came from the Declude.JunkMail mailing list.  To
unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
type "unsubscribe Declude.JunkMail".  You can E-mail
[EMAIL PROTECTED] for assistance.  You can visit our web
site at http://www.declude.com .