[Snort-sigs] rule documentation for FTP ADMw0rm ftp login attempt

Josh.Sakofsky at ...1573... Josh.Sakofsky at ...1573...
Fri Jun 6 12:05:18 EDT 2003


Rule: FTP ADMw0rm ftp login attempt

--
Sid: 144

--
Summary: An FTP login by user "w0rm" was attempted. This is an account 
used by the ADMw0rm-v1 worm.

--
Impact: Infected systems are left with a backdoor user account named 
"w0rm" and an email with the victims ip address is emailed to the worms 
creators.

--
Detailed Information: This worm exploits a vulnerability in BIND version 
4.9.6 and is linux specific. These attempts mean the box has probably 
already been compromised.

--
Affected Systems: Default installations of RedHat 4.0 to 5.2

--
Attack Scenarios: Standard Internet worm.

--
Ease of Attack: Simple.

--
False Positives: None Known

--
False Negatives: None Known

--
Corrective Action: Upgrade BIND on vulnerable servers.

--
Contributors: Original rule writer unknown.
              Josh Sakofsky
-- 
Additional References: http://www.whitehats.com/info/IDS01
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.snort.org/pipermail/snort-sigs/attachments/20030606/8c5e7d22/attachment.html>


More information about the Snort-sigs mailing list