File: 1284.txt

package info (click to toggle)
snort 2.9.7.0-5
  • links: PTS, VCS
  • area: main
  • in suites: buster, sid, stretch
  • size: 55,000 kB
  • ctags: 38,464
  • sloc: ansic: 266,667; sh: 12,508; makefile: 2,908; yacc: 497; perl: 496; lex: 261; sed: 14
file content (70 lines) | stat: -rw-r--r-- 1,607 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
Rule:  

Sid:
1284

--

Summary:
This event is generated when an attempt is made to download a
Nimda-infected attachment from a web server.

--
Impact:
Serious. A Nimda-infected web server may have spread the Nimda worm to the web
client.

--
Detailed Information:
One of the methods the Nimda worm uses to propagate is by passing malicious
code from an infected web server to a web client.  The Nimda-infected
code often uses the filename extension ".EML".

The fully automated Nimda worm that has already infected an IIS web server
searches through and infects the local web pages with malicious javascript.
When a vulnerable web client attempts to load a web page from this server,
the javascript will cause the web client to download and execute the
Nimda-infected readme.eml file, causing the web client to become
Nimda-infected.

--
Affected Systems:
	Microsoft Windows based systems.

--
Attack Scenarios:
The user must use a link on an infected server.

--
Ease of Attack:
Simple. This is worm activity.

--
False Positives:
None Known

--
False Negatives:
The Nimda worm may spread via any file with the .EML or .NWS extension, not
just readme.eml.  This rule will not catch other .EML or .NWS files.

--
Corrective Action:
Examine the host for signs of infection.

Use Anti-Virus tools to clean an infected host.

Consider the use of alternative operating systems that are not
vulnerable to this kind of attack.

--
Contributors:
Original rule writer unknown
Original document author unkown
Sourcefire Vulnerability Research Team
Nigel Houghton <nigel.houghton@sourcefire.com>

--
References:

--