📄 1284.txt
字号:
Rule: Sid:1284--Summary:This event is generated when an attempt is made to download aNimda-infected attachment from a web server.--Impact:Serious. A Nimda-infected web server may have spread the Nimda worm to the webclient.--Detailed Information:One of the methods the Nimda worm uses to propagate is by passing maliciouscode from an infected web server to a web client. The Nimda-infectedcode often uses the filename extension ".EML".The fully automated Nimda worm that has already infected an IIS web serversearches through and infects the local web pages with malicious javascript.When a vulnerable web client attempts to load a web page from this server,the javascript will cause the web client to download and execute theNimda-infected readme.eml file, causing the web client to becomeNimda-infected.--Affected Systems: Microsoft Windows based systems.--Attack Scenarios:The user must use a link on an infected server.--Ease of Attack:Simple. This is worm activity.--False Positives:None Known--False Negatives:The Nimda worm may spread via any file with the .EML or .NWS extension, notjust readme.eml. This rule will not catch other .EML or .NWS files.--Corrective Action:Examine the host for signs of infection.Use Anti-Virus tools to clean an infected host.Consider the use of alternative operating systems that are notvulnerable to this kind of attack.--Contributors:Original rule writer unknownOriginal document author unkownSourcefire Vulnerability Research TeamNigel Houghton <nigel.houghton@sourcefire.com>--References:--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -