[49843] in North American Network Operators' Group
Re: Just an FYI - Apache Worm on the loose
daemon@ATHENA.MIT.EDU (Stephen J. Wilcox)
Wed Jul 10 18:32:01 2002
Date: Wed, 10 Jul 2002 23:30:22 +0100 (BST)
From: "Stephen J. Wilcox" <steve@opaltelecom.co.uk>
To: Scott Francis <darkuncle@darkuncle.net>
Cc: Jason Legate <jlegate@alienchick.com>, nanog@nanog.org
In-Reply-To: <20020710152921.GG49803@darkuncle.net>
Errors-To: owner-nanog-outgoing@merit.edu
If you want to be proactive, filter this port across your backbone and you will
very quickly see what hosts have been compromised.. on the other hand individual
customers seem to use all their bandwidth so they tend to phone in pretty quick!
Steve
On Wed, 10 Jul 2002, Scott Francis wrote:
> On Tue, Jul 09, 2002 at 02:26:23PM -0700, jlegate@alienchick.com said:
> > There is an Apache worm out there, and it uses port 2001/udp to operate. You
> > may wanna scan your own boxes for this open port.
>
> Announced last week on BUGTRAQ and elsewhere.
> http://online.securityfocus.com/archive/1/279529
>
> (and was it _really_ necessary to post a hex dump of the entire thing? The
> actual source is available linked from the BUGTRAQ post above ...)
>