Blocking Code Red and Nimda - Code Blue with Volera Excelerator

(Last modified: 29Oct2003)

This document (10080772) is provided subject to the disclaimer at the end of this document.

goal

Blocking Code Red and Nimda - Code Blue with Volera Excelerator

fact

Novell Volera Excelerator

fix

The following filters can be added to Excelerator 2.x software to block Code Blue or Nimda and Code Red worms. 
 
Please note that while these commands are written for the telnet / command line interface, you can also enter the the same filter overrides from the browser-based management tool via the Cache Panel, Filtering tab, Override list, Insert.  Enter the URLs referenced below, and set "Allow" to Never.
 
add filter override=http://*/readme.eml
add filter override=http://*/scripts/root.exe
add filter override=http://*/msadc/root.exe
add filter override=http://*/*/winnt/system32/cmd.exe
add filter override=http://*/msadc/..*/winnt/system32/cmd.exe
add filter override=http://*/default.ida
apply

The first five filters are for the Code Blue - W32/Nimda - Concept Virus (CV) v.5 worm.  The last filter is for Code Red.
 
NOTE:  The filter override function only applies to the Client Accelerator (forward proxy), but not to the Web Server Accelerator(s).  This means that while filter overrides can prevent local machines from intesting through the Client Accelerator (i.e. infecting external systems), it cannot prevent propagation of the worm through Web Server Accelerators.  The security fixes still needs to be applied to the web servers.  Configuring an accelerator to require authentication will also block these worms from propagating, as they will be unable to authenticate.
 
Please see the CERT advisory at http://www.cert.org/advisories/CA-2001-26.html and http://www.cert.org/advisories/CA-2001-19.html for more information regarding the worms.
 
Please also see the Microsoft security bulletins at http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/topics/codeblue.asp and http://www.cert.org/advisories/CA-2001-19.html.

The following filters can be added to Excelerator XL 1.x software to block Code Blue or Nimda and Code Red worms.

From the GUI, select Configuration, Access Control (under Security Settings), add a name for the new Access Control Policy.  Leave the default Stage setting of User Request, and click Insert.  Click "1" to edit rule 1.  Set the Condition to URL, and the Operator to "path is."  Enter the following paths, and save the changes.

/readme.eml
/scripts/root.exe
/msadc/root.exe
/winnt/system32/cmd.exe
/default.ida

Please note that while these instructions are written for the GUI interface, these can be also be configured via SSH or the console command line.

note

These same measures also apply for Code.Red.F and other similar variants of Code Red.

document

Document Title: Blocking Code Red and Nimda - Code Blue with Volera Excelerator
Document ID: 10080772
Solution ID: NOVL87597
Creation Date: 04Mar2003
Modified Date: 29Oct2003
Novell Product Class:NetWare
Volera Excelerator

disclaimer

The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.
Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.