Re: Blocking Nimda and kin

From: Peter W (peterwat_private)
Date: Thu Nov 08 2001 - 14:46:53 PST

  • Next message: Kutulu: "Re: ZoneAlarm Pro Local Internet not only Locally!"

    On Tue, Nov 06, 2001 at 07:43:56PM -0700, Brett Glass wrote:
    
    > Just thought the denizens of the Bugtraq list might be interested in a 
    > quick fix for Apache which instantly blocks Nimda (all variants), Code 
    > Red, sadmind/IIS, and kin.
    
    > To quickly blackhole the worms, just add the following to your logging 
    > configuration in Apache's httpd.conf file.
    
    > SetEnvIf Request_URI "/winnt/system32/cmd\.exe" nimda
    
    > CustomLog "|exec sh" "route -nq add -host %400,404a 127.0.0.1 -blackhole"  env=nimda
    
    This is very cool stuff. So I can get someone to view an HTML page|email
    with code like <img alt="" height="0" width="0" hspace="0" vspace="0"
    src="http://brettglass.example.com/winnt/system32/cmd.exe">, I can easily
    prevent them, or anyone else coming from the same space, from reaching your
    Web server. Get some AOL users to read the messages and bye-bye to all the
    AOL proxy server traffic. Get lots of usenet "victims", and even if they
    don't care about your Web site, man, your routing table suddenly looks bad.
    
    Very (un)cool.
    
    -Peter
    
    P.S. If that exec sh route thing actually works, does that mean your httpd 
    is running as root? Or is "route" a SUID wrapper, so the httpd user only has 
    the ability to wreck your routing table? Just curious.
    



    This archive was generated by hypermail 2b30 : Thu Nov 08 2001 - 22:52:28 PST