PHP exploit (Was Re: Wave of Nimda-like hits this morning?)

From: Chris Adams (chris@improbable.org)
Date: 02/27/02


Date: Tue, 26 Feb 2002 17:48:48 -0800
To: "Jay D. Dyson" <jdyson@treachery.net>
From: Chris Adams <chris@improbable.org>

On Tuesday, February 26, 2002, at 12:28 , Jay D. Dyson wrote:
>> Whatever this (maybe) new bug is, it's blowing up these boxes left and
>> right...can't figure it out. They're all relatively new 1.3'ish
>> versions I think.
>
> I've heard rumblings of an Apache/PHP exploit making the rounds.
> Any of these machines using PHP by chance?

This just hit the snort-sigs list this afternoon:

From: Brian <bmc@snort.org>
Date: Tue Feb 26, 2002 04:02:22 US/Pacific
Subject: [Snort-sigs] php overflow signatures

Below are the initial signatures for the PHP overflow that is about to
get a bunch of publication. Have fun and whatnot.

Sourceforge's CVS server is broken, so these are not yet in CVS.

alert tcp $EXTERNAL_NET any -> $HOME_NET 80 (msg:"EXPERIMENTAL php
content-disposition memchr overlfow"; flags:A+;
content:"Content-Disposition\:"; content:"name=\"|CC CC CC CC CC|";
classtype:web-application-attack; sid:1423; rev:1;)

alert ip $EXTERNAL_NET any -> $HOME_NET any (msg:"EXPERIMENTAL SHELLCODE
x86 EB OC NOOP"; content:"|EB 0C EB 0C EB 0C EB 0C EB 0C EB 0C EB 0C EB
0C|"; classtype:shellcode-detect; sid:1424; rev:1;)

alert tcp $EXTERNAL_NET any -> $HOME_NET 80 (msg:"EXPERIMENTAL php
content-disposition"; flags:A+; content:"Content-Disposition\:";
content:"form-data\;"; classtype:web-application-attack; sid:1425;
rev:1;)

----------------------------------------------------------------------------
This list is provided by the SecurityFocus ARIS analyzer service.
For more information on this free incident handling, management
and tracking system please see: http://aris.securityfocus.com