File: 1809.txt

package info (click to toggle)
snort 2.9.7.0-5
  • links: PTS, VCS
  • area: main
  • in suites: bullseye, buster, sid, stretch
  • size: 55,000 kB
  • ctags: 38,464
  • sloc: ansic: 266,667; sh: 12,508; makefile: 2,908; yacc: 497; perl: 496; lex: 261; sed: 14
file content (62 lines) | stat: -rw-r--r-- 1,264 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
Rule:

--
Sid:
1809

--
Summary:
This event is generated when an attempt is made to infect a web server by the "Scalper" worm.

--
Impact:
An infected server will open ports and listen for commands as well as 
attempt to infect more systems.

--
Detailed Information:
This worm takes advantage of the chunked encoding vulnerability in 
Apache to infect new systems. Once infected, the worm opens UDP port 
2001 and will listen for additional commands. It will also begin 
scanning for new hosts to infect.

--
Affected Systems:
Version of Apache 1.3 up to and including 1.3.24 and versions of Apache 
2.0 up to 2.0.36. All versions of Apache 1.2 are vulnerable. This worm 
will only infect systems running FreeBSD.

--
Attack Scenarios:
Typical self-replicating worm.

--
Ease of Attack:
Simple. This is worm activity and is fully automated.

--
False Positives:
None Known.

--
False Negatives:
None known.

--
Corrective Action:
Upgrade your installation of Apache if you are running a vulnerable 
version.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Snort documentation contributed by Kevin Peuhkurinen

-- 
Additional References:

Symantec
http://securityresponse.symantec.com/avcenter/venc/data/freebsd.scalper.worm.html

--