![]() |
Active Perl Overflow Attack
I had an Active Perl Overflow Attack tonight (my firewall caught it). I tried to find out what this is on the net but all I could find was very, very technical jargon about it. Can someone please tell me what it is and why I get them in as non-technical manner as possible? Thanks
|
probably you mean Active State PERL overflow. Activestate is the commercial company that does a lot of the Perl maintenance and such.
Basically, here's what is happening. Someone is trying to scan your machine to see if it is vulnerable to a particular attack. So, they are hitting your webserver with a request that, if successful, might crash your machine, implant a virus, or do any other manner of thing. A buffer overflow happens when a programmer improperly allocates too little space for a variable. So, the programmer allocated 100k for a variable but loaded that variable with 128k of data. This is a very easy error to make, a simple typo, incorrect conversion from hex to decimal, or other mistakes can cause it. Once a smart hacker finds one of these variables, they can now, in the above example, load an arbitrary 28k of data into memory and execute it. This program can do anything the hacker is creative enough to make it do. Now, for you, if your firewall is catching it, don't worry. You might want to look up and see if your version of perl is patched for whatever exploit it is trying to use. Reporting the IP to the attackers ISP is probably useless, as the source machine is probably a machine infected with a virus or trojan. Bottom line: check for perl updates. If you are patched, no worries. |
I have a Norton Firewall that came with the whole package (Norton Internet Security). I have heard that it is not the best but have heard good things about Zone Alarm. My question is this: which is better? A "better" free firewall or a pay (to be read "updatable") firewall? Your thoughts, feelings, suggestions, etc.
|
Quote:
|
Is it possible to run with two firewalls? Both the Norton and the Zonealarm? I'm I doubly "protected" or simply creating unnecessary conflicts between the two firewalls? Would anyone know? Thanks
|
Quote:
The best route is to run a dedicated hardware FW first for the outside world; a router or old *nix box is fine for this purpose. The main reason I have software firewalls on my systems is to explicity monitor all attempted outgoing connections; my 3com router does all of the actual port stealthing and firewall duties for inbound traffic. |
Quote:
Running NAT will make your system invisible to almost all attackers. Any good personal firewall will do the rest. Personally, I think running a home windows machine on an external address is just asking for trouble, unless you really know what you're doing. Many of the new exploits don't even need human intervention (like clicking on an outlook message). |
All times are GMT -8. The time now is 03:36 AM. |
Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
Search Engine Optimization by vBSEO 3.6.0 PL2
© 2002-2012 Tilted Forum Project