LinuxQuestions.org
Latest LQ Deal: Latest LQ Deals
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 05-21-2006, 11:13 PM   #1
mnauta
Member
 
Registered: Apr 2003
Posts: 152

Rep: Reputation: Disabled
exploit question SEARCH /\x90\xc9\


I have an IPS from a major vendor, and the following exploit was not blocked or noticed. I contacted the vendor, and they could not identify the exploit in order to recommend which signature to block on.

The following was in my Apache access_log:
SEARCH /\x90\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9

\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9 \xc9\xc9\xc9\xc9\xc9\xc9\x

c9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\x c9\xc9\xc9\xc9\xc9\xc9\xc9

\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9 \xc9\xc9\xc9\xc9\xc9\xc9\x

c9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\x c9\xc9\xc9\xc9\xc9\xc9\xc9

\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9 \xc9\xc9\xc9\xc9\xc9\xc9\x

c9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\x c9\xc9\xc9\xc9\xc9\xc9\xc9

\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9 \xc9\xc9\xc9\xc9\xc9\xc9\x

c9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\xc9\x c9\xc9\xc9\xc9\xc9\xc9\xc9

It's only a small part of the whole exploit. Does anyone know which exploit or vulnerability it is?

Thanks
 
Old 05-21-2006, 11:36 PM   #2
slackhack
Senior Member
 
Registered: Jun 2004
Distribution: Arch, Debian, Slack
Posts: 1,016

Rep: Reputation: 47
i think it's some windoze exploit. are you running apache? i don't think it's dangerous except for the b.s. it's adding to your logs. if it were me, i would block the IP at the firewall, and then keep an eye out for it coming back. maybe even report the IP to their ISP, for whatever good it does, if it's even in the US.
 
Old 05-21-2006, 11:51 PM   #3
Capt_Caveman
Senior Member
 
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658

Rep: Reputation: 69
Without seeing the entire exploit, it looks like the WebDAV exploit in Microsoft IIS. AFAIK, Apache doesn't even support the SEARCH method.

Very good/extensive reading on it:
http://www.sans.org/resources/malwar...av-exploit.php
 
Old 05-22-2006, 08:07 AM   #4
mnauta
Member
 
Registered: Apr 2003
Posts: 152

Original Poster
Rep: Reputation: Disabled
thanks for the info. I'll read that sans link. I keep my linux servers fully patched, it's just that I'm paying for an IPS box which is supposed to stop exploits like this (at least they claim to)
 
Old 05-22-2006, 07:51 PM   #5
Capt_Caveman
Senior Member
 
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658

Rep: Reputation: 69
I would be concerned if it's not stopping that. Unless they've specifically configued it to filter only *Nix exploits/vulns (which is still questionable from a security standpoint) then there is something wrong or it's a PoS (no offense). Either way you should be getting your moneys worth.
 
Old 05-22-2006, 08:29 PM   #6
mnauta
Member
 
Registered: Apr 2003
Posts: 152

Original Poster
Rep: Reputation: Disabled
There is a problem identifying it because apache cuts of the payload padding because "URI" to long, so I can never see the exact exploit code. However, the next post command is the following

205.238.242.191 - - [21/May/2006:16:30:41 -0500] "POST /_vti_bin/_vti_aut/fp30reg.dll HTTP/1.1" 403 311 "-" "-"

this makes me think it's a older front page exploit CVE-2001-0341.

A tech support person called me today, I was surprised. However, they were still in the dark about this one.

I have enabled Etheral on the webserver and filter on the offending ip range! This person comes back very frequently with this exploit, I'm sure I can capture all the packets.

I hope this IPS is not a POS!
 
Old 05-22-2006, 09:37 PM   #7
unixfool
Member
 
Registered: May 2005
Location: Northern VA
Distribution: Slackware, Ubuntu, FreeBSD, OpenBSD, OS X
Posts: 782
Blog Entries: 8

Rep: Reputation: 158Reputation: 158
Quote:
Originally Posted by mnauta
There is a problem identifying it because apache cuts of the payload padding because "URI" to long, so I can never see the exact exploit code. However, the next post command is the following

205.238.242.191 - - [21/May/2006:16:30:41 -0500] "POST /_vti_bin/_vti_aut/fp30reg.dll HTTP/1.1" 403 311 "-" "-"

this makes me think it's a older front page exploit CVE-2001-0341.

A tech support person called me today, I was surprised. However, they were still in the dark about this one.

I have enabled Etheral on the webserver and filter on the offending ip range! This person comes back very frequently with this exploit, I'm sure I can capture all the packets.

I hope this IPS is not a POS!
1. The "\xc9\"s are the exploits being run against the web server...that's what matters. The URI isn't so important.

2. This is indeed a WebDAV buffer overflow exploit, as Capt Caveman stated, and a rather old exploit at that. I see many of these daily at work (I'm a security engineer/analyst) and it is usually paired with the Frontpage exploit also. As long as you aren't running IIS (and if so, it should be patched since the exploits are so old), you're safe.

3. The IPS platform, what is it? The IPS is most likely not a POS. All IPSs and IDSs require customization and up-to-date signature sets. Since these are older exploits (I'm talking like 3+ yrs old), the signatures should be on the IPS, unless someone disabled them, which is entirely possible. I'd definitely check to see when the last signature update occurred and what signatures are enabled and disabled. If you aren't running any MS-based software, these two signatures don't need to be enabled, as you don't normally want to see attacks that won't affect your network, only the ones that have the potential to.

Last edited by unixfool; 05-22-2006 at 09:41 PM.
 
Old 05-22-2006, 09:47 PM   #8
mnauta
Member
 
Registered: Apr 2003
Posts: 152

Original Poster
Rep: Reputation: Disabled
the ips is uptodate, the vendor reviewed the system logs. I'm not running any Windows boxes but I do want to get value for my money.

I don't want to flame the vendor yet because they have been responsive and concerned. But I am VERY surprised that the box did not catch an old exploit like this.

Once I capture the packets with Etheral the vendor can confirm if the sig is there or not (I hope )
 
Old 05-22-2006, 10:22 PM   #9
slackhack
Senior Member
 
Registered: Jun 2004
Distribution: Arch, Debian, Slack
Posts: 1,016

Rep: Reputation: 47
n/t.............

Last edited by slackhack; 05-22-2006 at 10:24 PM.
 
Old 05-23-2006, 09:46 AM   #10
unixfool
Member
 
Registered: May 2005
Location: Northern VA
Distribution: Slackware, Ubuntu, FreeBSD, OpenBSD, OS X
Posts: 782
Blog Entries: 8

Rep: Reputation: 158Reputation: 158
Quote:
Originally Posted by mnauta
the ips is uptodate, the vendor reviewed the system logs. I'm not running any Windows boxes but I do want to get value for my money.

I don't want to flame the vendor yet because they have been responsive and concerned. But I am VERY surprised that the box did not catch an old exploit like this.

Once I capture the packets with Etheral the vendor can confirm if the sig is there or not (I hope )

I can understand wanting to get the best bang for your money, BUT having an IDS/IPS alert on malicious activity that will have no affect whatsoever on your network isn't going to provide that bang for the buck and may very well put your device under an undue load.

If anything, just check to see if the IPS is performing as advertised. When I ask if the IPS is up-to-date, I don't mean a flash-rom update or update of the application. I mean, be sure that the attack signature set is at its latest version. If it is, also be aware that the device may be tuned to your specific environment. You mentioned that you aren't running any Windows boxes on your network. The first thing a security engineer is going to do when tuning any IPS/IDS is get rid of any signatures that aren't specific to his network. Did an engineer (from the vendor or your company) tune this device?

Lastly, I've got a payload capture (from Snort) of WebDAV and Frontpage. It is here.
 
Old 05-23-2006, 09:56 AM   #11
mnauta
Member
 
Registered: Apr 2003
Posts: 152

Original Poster
Rep: Reputation: Disabled
thanks for the payload capture.

I installed the device myself, and all the signatures are uptodate. You are probably right, why put a load on the box for outdated exploits.
 
Old 05-23-2006, 10:28 PM   #12
Capt_Caveman
Senior Member
 
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658

Rep: Reputation: 69
If it's a true IPS that's sitting inline, then allowing remote systems to inject 65kb+ malicious packets into your LAN isn't any less of a performace hit than dropping it at the gateway and putting an entry in the database. Apache is going to have to deal with it if the IPS doesn't...

If you don't want to deal with added noise, only enable necessary MS alerts or just use a BPF rule.

Last edited by Capt_Caveman; 05-23-2006 at 10:37 PM.
 
Old 05-24-2006, 07:44 AM   #13
unixfool
Member
 
Registered: May 2005
Location: Northern VA
Distribution: Slackware, Ubuntu, FreeBSD, OpenBSD, OS X
Posts: 782
Blog Entries: 8

Rep: Reputation: 158Reputation: 158
I was pointing more toward ALL MS-related sigs or most of them. I can see turning on a few just so discern what's hitting your network, but honestly, it doesn't make any sense to do that when you've server logs and/or ethereal/tcpdump to do the ocassional spot check of traffic you may not be recording.

Another reasoning is that if you turn on everything to try to catch everything, eventually you'll be running into drive space issues. Also, the more you attempt to record, the more load the IPS/IDS will be under. If you've ever run Snort with EVERYTHING turned on, then checked your memory usage, even without much traffic to sniff through the IDS will be eating a LOT of memory. And, if you're on a busy network, Snort will definitely load up the CPU considerably.

You just can't deploy an IDS without considering things such as this.

Your last point was a good point though, especially the BPF rule (although, with alot of traffic triggering the BPF rule has the potential to DoS your IPS/IDS).
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Question on aptitude search pattern Akhran Linux - Newbie 4 02-10-2006 12:39 PM
SEARCH / \x90\ attack mnauta Linux - Security 2 11-18-2004 07:16 AM
Apache "SEARCH /\x90\ ... solution s34n Linux - Security 0 10-08-2004 10:09 AM
apache logs showing strange "SEARCH /\x90\x02\xb1" lines TheOneAndOnlySM Linux - Software 1 06-28-2004 04:39 PM
Quick VIM question (unhighlighting search terms after search) lrt2003 Linux - Newbie 5 05-08-2004 05:21 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 07:42 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration