Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 4 Jun 2001 10:14:20 -0500 (EST)
From:      Mike Squires <mikes@ct980320-b.blmngtn1.in.home.com>
To:        Josh Thomas <jdt2101@ksu.edu>
Cc:        freebsd-security@freebsd.org
Subject:   Re: rpc.statd attack before ipfw activated
Message-ID:  <200106041514.f54FEKL18615@ct980320-b.blmngtn1.in.home.com>
In-Reply-To: <Pine.GSO.4.21L.0106040126530.3155-100000@unix1.cc.ksu.edu> "from Josh Thomas at Jun 4, 2001 01:30:42 am"

next in thread | previous in thread | raw e-mail | index | archive | help
I think this is the LINUX Ramen/Lion/Adore worm in action.  The NOPs
are always preceded by a check for rpc.statd services.  snort will
detect these.

I use snortsnarf with snort; snortsnarf gives you Web lookups for the
attacks.

4.3-STABLE isn't vulnerable, as far as I know.

MLS

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200106041514.f54FEKL18615>