On Wed, Sep 03, 2003 at 11:42:40AM -0400, Anderson, Harry F wrote:

>       I have written a simple script to flag systems that have
>    the nachi/welchi worm.  But when run against a known infected
>    system with the registry keys it doesn't flag anything.
...
>    key = "SYSTEM\CurrentControlSet\Services\RpcTftpd";
>    item = "Network Connections Sharing";
>    a = registry_get_sz(key:key, item:item);
>    if("%System%\wins\svchost.exe" >< a)security_hole(135);

I think item should be "ImagePath", not "Network Connections Sharing" --
ImagePath is the subkey used to locate the service. 

By the way, it might be nicer to incorporate this into smb_virii.nasl.  Here's
a patch that does just that:

                           ---- snip, snip, snip ----
--- smb_virii.nasl-orig Thu Aug 21 19:00:17 2003
+++ smb_virii.nasl      Thu Sep  4 17:27:14 2003
@@ -8,7 +8,7 @@
 {
  script_id(11329);

- script_version("$Revision: 1.12 $");
+ script_version("$Revision: 1.13 $");

  name["english"] = "The remote host is infected by a virus";

@@ -32,6 +32,7 @@
        - [EMAIL PROTECTED]
        - [EMAIL PROTECTED]
        - [EMAIL PROTECTED]
+        - W32.Welchia.Worm

 Risk factor : High
 Solution : See the URLs which will appear in the report";
@@ -183,7 +184,13 @@
 exp[i]         = "videodrv.exe";


+i++;

+name[i]        = "W32.Welchia.Worm";
+url[i]         = 
"http://securityresponse.symantec.com/avcenter/venc/data/w32.welchia.worm.html";;
+key[i]         = "SYSTEM\CurrentControlSet\Services\RpcTftpd";
+item[i]        = "ImagePath";
+exp[i]         = "%System%\wins\svchost.exe";
                           ---- snip, snip, snip ----


George
-- 
[EMAIL PROTECTED]

Attachment: pgp00000.pgp
Description: PGP signature

Reply via email to