On 5/19/10 5:44 PM, kitepilot@kitepilot.com wrote: > Hello World: > Long story short: > I got an "official" notification that a computer behind my Linux > firewall has the "Win32.Worm.Allaple.Gen" virus. > I have some 150 puters NAT(ed) behind that firewall and no access > whatsoever to any of them. > Question is: > What can I do at the Firewall level to identify the virus' traffic so > I can harvest the puter's IP address... > Thanks! > ET from http://www.threatexpert.com/report.aspx?md5=732f8e67310a1de1c945948bda2512eb *********** Summary of the findings: What's been found: A network-aware worm that uses known exploit(s) in order to replicate across vulnerable networks. MS04-012: DCOM RPC Overflow exploit - replication across TCP 135/139/445/593 (common for Blaster, Welchia, Spybot, Randex, other IRC Bots). Contains characteristics of an identified security risk. *********** --------------------------------------------------- PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us To subscribe, unsubscribe, or to change your mail settings: http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss