sos5.1.0
medium
This signature detects attempts to exploit a vulnerability in
Pingtel Xpressa phones. Attackers may supply an overly long
request to the HTTP management server on the phone to
execute arbitrary code or crash the phone (the phone must
be rebooted).
VOIP:MGMT:XPRESSA-HTTP-DOS
sos5.1.0
medium
This signature detects attempts by the Agobot worm to
enumerate SMB shares via HTTP.
WORM:AGOBOT:HTTP-SHARE-ENUM
sos5.1.0
high
This signature detects the PY variant of the Agobot worm
as it attempts to infect another host. This signature could
be prone to false positives.
WORM:AGOBOT:PY-HTTP-PROP
sos5.1.0
high
This signature detects the AF variant of the Bagle SMTP
virus. Bagle sends e-mails that contain an attachment with
a malicious payload. When the attachment is viewed, the
payload uses HTTP to load an external link, which is actually
an executable program that infects the target host. The virus
then sends a copy of itself to e-mail addresses found on the
target's hard drive, using the target's e-mail address as the
return address.
WORM:BAGLE:AF-HTTP
sos5.1.0
high
This signature detects the AF variant of the Bagle SMTP
virus. Bagle sends e-mails to victims with an attachment
with malicious payload. Attempting to view the attachment,
which is actually an executable program, infects the user.
The virus then sends a copy of itself to e-mails found
searching the victim's hard drive for addresses, with the
victim's e-mail address as the return address.
WORM:BAGLE:AF-SMTP
sos5.0.0,
sos5.1.0
high
This signature detects the Berbew worm as it uploads
keylogger information to a listening post. Berew monitors
user keystrokes for financial data and reports that
information to an attacker via HTTP to a listening post.
Source IP addresses that trigger this signature are extremely
likely to be infected with the Berbew worm.
WORM:BERBEW:KEYLOGGER-UPLOAD
sos5.1.0
high
This signature detects Bobax worm activity. The C variant
of the Bobax worm attempts to lookup the correct IP
addresses for listening post servers set up by the Bobax virus
authors. Because lookups for these addresses are extremely
suspicious, you should investigate the source device for
Bobax infection. However, this signature detects Bobax
activity (not Bobax infection attempts), and cannot be used
to prevent Bobax infection. To prevent Bobax infection,
configure your security policy to drop traffic that matches
the signatures "Windows RPC: LSASS Malicious OpCode"
and "Windows RPC: LSASS DCE-RPC Oversized Fragment".
WORM:BOBAX:C-PHONE-HOME-DNS
sos5.0.0,
sos5.1.0
medium
The signature detects attempts to infect an Microsoft IIS
server with the Code Red worm using a .ida buffer-overflow
attack. The installed worm downloads code from the donor
host, creates a backdoor on the victim, and sets up 100
threads of the worm that scan for other vulnerable hosts
using random IP addresses. Code Red also checks the host
system time; on the 20th of each month (GMT), all infected
systems send 100k bytes of data to TCP/80 of
www.whitehouse.gov, causing a denial-of-service (DoS).
WORM:CODERED:INFECTION-ATTEMPT
Copyright © 2010, Juniper Networks, Inc.
946
Network and Security Manager Administration Guide
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...