📄 1256.txt
字号:
Rule: --Sid:1256--Summary:This event is generated when an attempt is made access the root.exeexecutable on a webserver. --Impact:This activity is indicative of a CodeRed worm infection.--Detailed Information:As part of the CodeRed infection process, cmd.exe (the windows commandinterpreter) gets copied to a number of locations throughout thefilesystem and named root.exe. Following a modification to the registry,root.exe becomes available from the web, allowing remote machines toexecute arbitrary commands.Only affects Windows machines with a listening webserver, primarily IIS.If root.exe does not exist, there is no impact aside from minor iritation.If root.exe _does_ exist, full system-level access at the priveledge levelof the user running the webserver is possible.--Affected Systems: Microsoft IIS web servers. --Attack Scenarios:Normally, access to root.exe is detected as part of an attempted infectionby another machine already infected by CodeRed. In other situations,root.exe may be accessed by remote machines/users in an attempt to gainaccess to a system.--Ease of Attack:Simple. This is worm activity.--False Positives:None Known--False Negatives:None Known--Corrective Action:If root.exe exists in the filesystem of the web server, remove themachine from the network and follow the vendor's recommend method forcleaning and repairing the damage done by this particular worm.Apply the appropriate vendor supplied patches.Upgrade to the latest non-affected version of the software.--Contributors:Original rule writer unknownOriginal document author unkownSourcefire Vulnerability Research TeamNigel Houghton <nigel.houghton@sourcefire.com>Jon Hart <warchild@spoofed.org>-- Additional References:CERT:http://www.cert.org/advisories/CA-2001-19.html--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -