File: 1800.txt

package info (click to toggle)
snort 2.3.3-11
  • links: PTS
  • area: main
  • in suites: etch, etch-m68k
  • size: 22,512 kB
  • ctags: 11,344
  • sloc: ansic: 70,967; sh: 4,848; makefile: 748; perl: 478; sql: 212
file content (63 lines) | stat: -rw-r--r-- 1,604 bytes parent folder | download | duplicates (8)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
Rule:

--
Sid:

1800

--
Summary:
This event is generated when an incoming email containing the Klez worm is detected.

--
Impact:
System compromise and further infection of target hosts.

--
Detailed Information:
W32/Klez.h@MM exploits the vulnerability in Microsoft Internet Explorer (ver 5.01 or 5.5 without SP2), enabling it to execute email attachments.

Once executed, it can unload several processes including Anti-virus programs.

The worm is able to propagate over the network by copying itself to network shares (assuming sufficient permissions exist). Target filenames are chosen randomly, and can have single or double file extensions.

--
Affected Systems:
	Microsoft Internet Explorer (ver 5.01 or 5.5 without SP2)

--
Attack Scenarios:
This virus can be considered a blended threat. It mass-mails itself to email addresses found on the local system, then exploits a known vulnerability, spreads via network shares, infects executables on the local system.

--
Ease of Attack:
Simple. This is worm activity.

--
False Positives:
Certain binary file email attachments can trigger this alert.

--
False Negatives:
None known.

--
Corrective Action:
Apply the appropriate vendor suppled patches.

Block incoming attachments with .bat, .exe, .pif, and .scr extensions 

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>
Snort documentation contributed by Nawapong Nakjang (tony@ksc.net, tonie@thai.com)

--
Additional References:

Symantec:
http://securityresponse.symantec.com/avcenter/venc/data/w32.klez.h@mm.html

--