My apologies,

The daemon that I mentioned Ramen used for attack is NOT nfsd but
statd.(thanks Jeff for the correction). I guess probably the kernel is
questionable as well since the source is public. The point is this message
was a friendly "heads up"  for people. Take it with a grain of salt, a
shot of tequilla, and be happy.

Enjoy,


On Thu, 18 Jan 2001, Paul D. Robertson wrote:

> On Thu, 18 Jan 2001, -- neil -- wrote:
> 
> > 
> > Within the last couple of days this worm has been rearing its ugly head.
> > Its seems to be infecting mainly Redhat 6.2 and 7.0 unpatched machines.
> > Specifically its using wuftp and nfsd. The link below is to a guy that
> > reversed engineered it.
> 
> There's also code that seems to exploit an LPRng bug.  There *appears* to
> be an IRC vector of some sort- I'm not sure if it's a comm. channel or
> inoperable since I haven't had the time or resources to do the depth of
> investigation that I'd like.
> 
> Turning off FTP is a generally good idea, and helps tremendously in this
> case because the SYN scanner seems to look for FTP servers before
> iterating through its attacks.
> 
> It seems to be confirmed as in the wild and legitimately viral.
> 
> Updating systems is still important, and I expect we'll see the usual home
> user and default install cases being the predominance of vulnerability.
> It'll probably also run on systems that have Linux emulation and run x86
> code- which may cover *BSD and Linux/Alpha with em86 (or whatever it's
> called, it's been a while since I had an Alpha desktop.)
> 
> BTW: I think the first reports of infection were almost two weeks ago.
> 
> Monitoring bandwidth utilization will help for boxes with Ethernet
> adapters, as the thing SYN scans like hell once it's running if it doesn't
> think it's on a ppp link.
> 
> Paul 
> -----------------------------------------------------------------------------
> Paul D. Robertson      "My statements in this message are personal opinions
> [EMAIL PROTECTED]      which may have no basis whatsoever in fact."
> 
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
> 


-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to