I installed snort yesterday because I've had a possible breakin (that's
another thread). The alert file had some things in it this morning and I
was wondering if these are real attacks or if Snort is just over
sensitive. I think that all of these attempts are looking for Microsoft
exploits so they can't effect me. I tried to lookup the IPs of the
attackers, 64.94.220.18 is unknown but 204.57.71.8 is pricewatch. I
access pricewatch all the time so is it possible that Snort is just
misinterpreting a perfectly benign operation?
[**] [1:882:1] WEB-CGI calendar access [**]
[Classification: Attempted Information Leak] [Priority: 2]
04/07-23:37:38.197745 xx.xxx.xxx.65:62954 -> 64.94.220.18:80
TCP TTL:63 TOS:0x10 ID:3362 IpLen:20 DgmLen:621 DF
***AP*** Seq: 0x14C0BA79 Ack: 0x9D9C91D Win: 0x2D40 TcpLen: 32
TCP Options (3) => NOP NOP TS: 9812763 1709877
[**] [1:882:1] WEB-CGI calendar access [**]
[Classification: Attempted Information Leak] [Priority: 2]
04/07-23:37:38.353621 xx.xxx.xxx.65:62953 -> 64.94.220.18:80
TCP TTL:63 TOS:0x10 ID:47566 IpLen:20 DgmLen:622 DF
***AP*** Seq: 0x14322FA1 Ack: 0x9BE97AF Win: 0xF8E0 TcpLen: 32
TCP Options (3) => NOP NOP TS: 9812779 1709879
[**] [1:882:1] WEB-CGI calendar access [**]
[Classification: Attempted Information Leak] [Priority: 2]
04/07-23:37:38.596397 xx.xxx.xxx.65:62954 -> 64.94.220.18:80
TCP TTL:63 TOS:0x10 ID:3365 IpLen:20 DgmLen:618 DF
***AP*** Seq: 0x14C0BCB2 Ack: 0x9D9CB5C Win: 0x3890 TcpLen: 32
TCP Options (3) => NOP NOP TS: 9812803 1709880
[**] [1:882:1] WEB-CGI calendar access [**]
[Classification: Attempted Information Leak] [Priority: 2]
04/07-23:37:38.751752 xx.xxx.xxx.65:62953 -> 64.94.220.18:80
TCP TTL:63 TOS:0x10 ID:47569 IpLen:20 DgmLen:621 DF
***AP*** Seq: 0x143231DB Ack: 0x9BE99B4 Win: 0xF8E0 TcpLen: 32
TCP Options (3) => NOP NOP TS: 9812818 1709882
[**] [1:1244:2] WEB-IIS ISAPI .idq attempt [**]
[Classification: Web Application Attack] [Priority: 1]
04/07-23:40:31.458472 xx.xxx.xxx.65:62968 -> 204.57.71.8:80
TCP TTL:63 TOS:0x10 ID:57181 IpLen:20 DgmLen:625 DF
***AP*** Seq: 0x1FF821ED Ack: 0x6D351052 Win: 0x16D0 TcpLen: 32
TCP Options (3) => NOP NOP TS: 9830090 0
[Xref => http://www.whitehats.com/info/IDS553]
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2000-0071]