Re: [OT] New Micro$oft vulnerability?

2001-09-24 Thread test
The Nimda worm deposits many files, some of which are hidden in different directories on the infected server. The worm plants itself in the root of any available drive as the file admin.dll. Other filenames for the worm include: ADMIN.DLL, LOAD.EXE, MMC.EXE, README.EXE, RICHED20.DLL,

Re: [OT] New Micro$oft vulnerability?

2001-09-24 Thread Ask Bjoern Hansen
On 19 Sep 2001, Vivek Khera wrote: NT http://www.torkington.com/vermicide.txt has a mod_perl handler to NT catch the requests as soon as they arrive, and discard them with a NT minimum of work to Apache. If your web server is struggling under the NT load, this might help. Why waste your

Re: [OT] New Micro$oft vulnerability?

2001-09-21 Thread Nathan Torkington
Tim Peoples writes: I tried doing the s/OK/DECLINED/ thing and it didn't do the trick. :-( I forgot to mention that this is in combination with HTML::Mason, but I doubt that should have any effect. This appears to be a bug in mod_perl, partially (said, I think, Geoff Young) fixed in the

Re: [OT] New Micro$oft vulnerability?

2001-09-21 Thread Tim Peoples
I was able to change all the PerlSetEnv directives to SetEnv and all seems to be well. There was really no need to set the values so early anyway (since they're only being referenced during content generation). Thanx, Tim. On Fri, Sep 21, 2001 at 02:13:29PM -0600, Nathan Torkington wrote:

Re: [OT] New Micro$oft vulnerability?

2001-09-20 Thread Tim Peoples
This 'Apache::Vermicide' module, installed as a 'PerlPostReadRequestHandler', seems to be preventing any 'PerlSetEnv' directives from being parsed out of a '.htaccess' file (or equivalent). IOW, the ENV vars aren't getting set properly. I'm investigating how to remedy this issue. Tim. On

Re: [OT] New Micro$oft vulnerability?

2001-09-20 Thread Tim Peoples
Hmmm... I tried doing the s/OK/DECLINED/ thing and it didn't do the trick. :-( I forgot to mention that this is in combination with HTML::Mason, but I doubt that should have any effect. Tim. On Tue, Sep 18, 2001 at 03:54:00PM -0600, Nathan Torkington wrote: Tim Peoples writes: This

Re: [OT] New Micro$oft vulnerability?

2001-09-19 Thread Larry Leszczynski
Hi Nat - Whoops! Returning OK terminates the PostReadRequest phase, apparently. Changing that to return DECLINED made PerlSetEnv work again. Sorry, Nat Before reading your post I had implemented a similar handler, although I put it in as a TransHandler, so I guess I should move it to

Re: [OT] New Micro$oft vulnerability?

2001-09-19 Thread Reuven M. Lerner
Jeremy Howard writes: Jeremy Any suggestions on how we should respond? Update Jeremy Apache::CodeRed to recognise the new signature, and send an Jeremy appropriate message to postmaster and webmaster with an Jeremy updated URL to point to? Rosh Hashana just ended here in Israel, and I

RE: [OT] New Micro$oft vulnerability?

2001-09-19 Thread Geoffrey Young
Whoops! Returning OK terminates the PostReadRequest phase, apparently. Changing that to return DECLINED made PerlSetEnv work again. Sorry, Nat Before reading your post I had implemented a similar handler, although I put it in as a TransHandler, so I guess I should move it to

RE: [OT] New Micro$oft vulnerability?

2001-09-19 Thread Lyle Brooks
This helps alot. I've been looking for a concise map of the various phases and what returns codes take me where. I'll probably post it on my wall. all phases up to and including content generation ought to behave exactly the same... - DECLINED moves to the next handler in the phase -

RE: [OT] New Micro$oft vulnerability?

2001-09-19 Thread Geoffrey Young
-Original Message- From: Lyle Brooks To: Geoffrey Young Cc: 'mod_perl list ' Sent: 9/19/01 5:57 PM Subject: RE: [OT] New Micro$oft vulnerability? This helps alot. I've been looking for a concise map of the various phases and what returns codes take me where. I'll probably post

RE: [OT] New Micro$oft vulnerability?

2001-09-19 Thread Nick Tonkin
On Wed, 19 Sep 2001, Lyle Brooks wrote: One motivation I have is for these virus attacks, I'd like to send out a 403 - Forbidden right at the beginning (say, when someone asks for default.ida) and then I'd like to have the option of not logging it to keep it from growing my logs and

[OT] New Micro$oft vulnerability?

2001-09-18 Thread Nick Tonkin
Sorry for the off-topic post; there was a lot of discussion here of CodeRed and Reuven's module to report attempted attacks. Since this a.m. I have had hundreds of requests like: /scripts/root.exe?/c+dir /MSADC/root.exe?/c+dir /c/winnt/system32/cmd.exe?/c+dir /d/winnt/system32/cmd.exe?/c+dir

RE: [OT] New Micro$oft vulnerability?

2001-09-18 Thread Matt Sergeant
-Original Message- From: Nick Tonkin [mailto:[EMAIL PROTECTED]] Sorry for the off-topic post; there was a lot of discussion here of CodeRed and Reuven's module to report attempted attacks. Since this a.m. I have had hundreds of requests like: /scripts/root.exe?/c+dir

Re: [OT] New Micro$oft vulnerability?

2001-09-18 Thread Wim Kerkhoff
Nick Tonkin wrote: Sorry for the off-topic post; there was a lot of discussion here of CodeRed and Reuven's module to report attempted attacks. Since this a.m. I have had hundreds of requests like: /scripts/root.exe?/c+dir /MSADC/root.exe?/c+dir /c/winnt/system32/cmd.exe?/c+dir

Re: [OT] New Micro$oft vulnerability?

2001-09-18 Thread Tom Servo
Slashdot has a report on this now, looks like a similar worm to CodeRed, but this one tries to hit numerous vulnerabilities, including backdoors left open by CodeRed. Brian Nilsen [EMAIL PROTECTED] On Tue, 18 Sep 2001, Nick Tonkin wrote: Sorry for the off-topic post; there was

Re: [OT] New Micro$oft vulnerability?

2001-09-18 Thread Adi Fairbank
I wish someone would just write a worm that would put these IIS machines out of their misery and stop causing the rest of us such a headache. Nick Tonkin wrote: Sorry for the off-topic post; there was a lot of discussion here of CodeRed and Reuven's module to report attempted attacks.

Re: [OT] New Micro$oft vulnerability?

2001-09-18 Thread Tom Servo
You're tellin' me, I've now had word come down that we need to do a full audit of our Apache and *nix installations to make sure that they're okay. Nevermind the fact that the only problems we have so far is people opening up files called readme.exe in their e-mail. *slapsforeheadinfrustration*

Re: [OT] New Micro$oft vulnerability?

2001-09-18 Thread Nathan Torkington
http://www.torkington.com/vermicide.txt has a mod_perl handler to catch the requests as soon as they arrive, and discard them with a minimum of work to Apache. If your web server is struggling under the load, this might help. The heuristic it uses for requests to ignore with prejudice is the

Re: [OT] New Micro$oft vulnerability?

2001-09-18 Thread Nathan Torkington
[Apologies if you get this twice--mailed it first from my oreilly.com account, which may not be the address subscribed to this list] http://www.torkington.com/vermicide.txt has a mod_perl handler to catch the requests as soon as they arrive, and discard them with a minimum of work to Apache. If

RE: [OT] New Micro$oft vulnerability?

2001-09-18 Thread Alex Porras
Adi Fairbank wrote: I wish someone would just write a worm that would put these IIS machines out of their misery and stop causing the rest of us such a headache. I think that it would be a lot easier to write a worm that puts IIS admins out of their misery--they're already busy applying

Re: [OT] New Micro$oft vulnerability?

2001-09-18 Thread Angel R. Rivera
you know guys, seems to me micro$not users should be thinking of product liability claim.. i mean, if you buy cigs and get cancer and can win a lawsuit or if you buy hot coffee and put it between your legs and can win, this should a real slam dunk. At 12:09 PM 9/18/2001 -0700, Tom Servo wrote:

Re: [OT] New Micro$oft vulnerability?

2001-09-18 Thread lembark
-- Jeremy Howard [EMAIL PROTECTED] on 09/19/01 06:37:15 +1000 This one's gonna grind the net to a halt pretty quick. I hate to think what this will mean for people running web servers at home over DSL (including me soon). Any suggestions on how we should respond? Update

Re: [OT] New Micro$oft vulnerability?

2001-09-18 Thread Nathan Torkington
Tim Peoples writes: This 'Apache::Vermicide' module, installed as a 'PerlPostReadRequestHandler', seems to be preventing any 'PerlSetEnv' directives from being parsed out of a '.htaccess' file (or equivalent). IOW, the ENV vars aren't getting set properly. I'm investigating how to remedy

Re: [OT] New Micro$oft vulnerability?

2001-09-18 Thread Nathan Torkington
Tim Peoples writes: I tried doing the s/OK/DECLINED/ thing and it didn't do the trick. :-( You're right, it was the restart that did it. OK/DECLINED makes no difference in that handler. I'm seeing, with or without my handler, the PerlSetEnv stuff only happening once per connection rather

RE: [OT] New Micro$oft vulnerability?

2001-09-18 Thread Geoffrey Young
I'm seeing, with or without my handler, the PerlSetEnv stuff only happening once per connection rather than once per request. I think this was addressed for 1.26 http://marc.theaimsgroup.com/?t=9946915503w=2r=1 however, as you can see at the end of the thread, I don't think the