11-02-2006 10:04 AM - edited 03-10-2019 03:18 AM
Thousands and thousands... apparently firing on nulls outside of uricontent. ASA5540/AIP-SSM20s. 5.1(3)S256.0.
11-02-2006 11:50 AM
I'm seeing "dozens" of "Null Byte in HTTP Requests" when certain users access their web-based email.
Have you heard from Cisco regarding?
11-02-2006 11:52 AM
Is anybody else seeing crashes related to this sig update? S256 crashed several of our sensors just after updating. P.O.S.
11-02-2006 11:56 AM
Also forgot to mention that we saw upwards of 14 thousand hits on this signature in under an hour from about 8 sensors. We couldn't disable it fast enough...
11-02-2006 12:05 PM
No crashes - yet. Our load is low on our 4240. If I do crash, I'll post it.
11-02-2006 01:34 PM
No crashes yet. But we did have a problem with a number of sensors after they received S255. It looks like the default signature set is getting too big - I now have to tune and disable a number of signatures just so the hardware can cope.
11-03-2006 02:15 AM
Several of our sensors hung during the S256 upgrade too. Actually we aborted the update due to it.
Last line in /usr/cids/idsRoot/var/updates/logs/install.log was:
Sending signature edc.
Same for you?
11-02-2006 01:06 PM
I'll assume its the -1 subsig. Can you flip verbose alert on for that sig, and provide us some of the alerts w/ verbose output. Thanks.
11-02-2006 01:54 PM
Sent you several in offline email.
11-14-2006 10:57 AM
11-06-2006 01:07 PM
Is there any update to this thread? We are also seeing thousands of events that appear to be false positives.
11-06-2006 01:41 PM
99% of the false positives I saw were from yahoo messengar notifications.
11-06-2006 02:55 PM
I would just do what we did; disable it across the board since it is obviously bogus.
11-16-2006 08:25 AM
Got alerts from CSM stating that "the sensor reports that it is running low on resources." Measure of resource utilization on the virtual sensor was 22. After disabling 5170 it's down to 0.
11-17-2006 09:35 AM
I just picked the last in this thread to respond too. 5170-1 is very much like 5171-0, it's looking for the exact same thing except in the arguments instead of the URI. We are still working with the engine developers, but you can turn the sig off until the new version is released, or edit the signature and set de-obfuscate to "false". The change to the signature in the upcoming release will be the deobfuscation change. Even with the change, this signature will still fire on BitTorrent traffic, as it normally has nulls embedded in the arguments, however in this case it would be a benign trigger and not a false positive since the signature only looks for the embedded null, and that occurs "naturally" in BitTorrent traffic.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide