<snip>
>> Err, for example, the sadmind worm is well known enough to be 
>> one of many hints for eEye to know that the mere existence of 
>> a cmd.exe backdoor is not proof for CodeRed.  It is suspicious, 
>> obviously, but if there is no way to conclusively identify a CR2 
>> infection, no scanners should loudly proclaim that a box is 
>> identified with CR2 and instead detail what exactly it found that 
>> was bad and hint at the potential causes if they desire to do so.  

See, I don't really expect this of a free tool.  It was put together quickly to try 
and let us know if we had a box that was vulnerable.  Maybe I am not remembering this 
correctly, but the Code Red scanner didn't ever tell me that something was infected.  
Only if it was vulnerable.  The Nimda tool was the first one that I remember that 
attempted to get the "infection" piece down.

Again, at the time that the scanner was put together, the main thing to check for was 
CMD.EXE and ROOT.EXE.  We didn't know about the .eml files, to scan .htm and .html 
files for README.EML and README.EXE and so on.

Could CMD.EXE and ROOT.EXE be a sign of something else?  Yeah.  But they also could be 
a sign of Nimda and no matter what they were a sign of, it was bad.  My guess is that 
eeye will eventually come out with a scanner that says, to check these 4 things and if 
ALL of them match then declare an infection, but I can't really fault them for not 
being more timely on a free tool.  :)

>> Case and point, eEye's public scanner release said "Code Red 
>> 2 detected (backdoor found!)" or something to that effect.

But again, in the case of Nimda, what is that backdoor.  It renamed SEVERAL .exes and 
many of them weren't known at the start.  It took me a couple of hours to figure out 
that my MMC.EXE had been changed.  If you check for certain file names and sizes, they 
change them and then eeye has to change their free scanner again.  To be honest, we 
all screamed when the Code Red scanner came out and said, don't just tell me if it is 
vulnerable, tell me if it is infected already.  Then eeye tried to do that and we are 
screaming because of false positives.  It will be refined over time, but it was a 
quick tool to help us.  Not an end-all, be-all, final authority.  (IMHO)

>> [..]
>> > There is no way to keep a FREE scanner up-to-date and 
>> EXACTLY right for all instances. 
>> 
>> I never said that it should be.

But that is what decrying this tool is saying.  The way I feel is that it could have 
been quick or right.  I'll take quick and as right as you can be over correct and a 
couple of days too late.

>> > I would MUCH rather have 2 false positives than 2 false 
>> negatives.  The scanner basically says, "either the worm has 
>> hit you or a moron setup your box and did X".  
>> 
>> Not really, it says it found CodeRed2 when all it found was 
>> the backdoor which could be a variety of things.

But that's my point, it found something that needed to be fixed and it was symptomatic 
of the worm.  Look there are a million different things that can write a CMD.EXE to a 
server, but if that is one of the major thing that this worm does, then you have to 
use it.  If we have to wait for the vendors to find one thing that this worm always 
does and is completely different than any other worm (so that there will be no false 
positives) then they won't be timely.  When I am here at 3 AM and I want to scan and 
see if I have any more holes here, I want timely.  Because I am looking for 
**vulnerable** .  I will take waiting a week or to get the **infected** part correct.  
I am going to rebuild those any way.  I need to find the vulnerable ones immediately 
and keep them from getting infected.  This tool worked great for that and I think that 
this is what eeye designed it for.  (Again, this is MHO)

<snip>

Reply via email to