<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: THREAT ALERT : high : 169.254.254.238 -&amp;gt; 169.254.255.255 Microsoft Windows NAT Helper DNS Query Denial of Service(31339) alert in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/threat-alert-high-169-254-254-238-gt-169-254-255-255-microsoft/m-p/28349#M20716</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The address is not outside your network, these are the reserved addresses for DHCP local link autoconfiguration when no DHCP server is seen by a client requesting a DHCP address.&amp;nbsp; You can see the RFC and a general description on the web sites here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://tools.ietf.org/html/rfc3927" title="http://tools.ietf.org/html/rfc3927"&gt;RFC 3927 - Dynamic Configuration of IPv4 Link-Local Addresses&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.tcpipguide.com/free/t_DHCPAutoconfigurationAutomaticPrivateIPAddressingA.htm" title="http://www.tcpipguide.com/free/t_DHCPAutoconfigurationAutomaticPrivateIPAddressingA.htm"&gt;The TCP/IP Guide - DHCP Autoconfiguration / Automatic Private IP Addressing (APIPA)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For any threat the place to go is search of the threat vault for the detail.&amp;nbsp; Take the threat number and plug it into the search form here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://threatvault.paloaltonetworks.com/" title="https://threatvault.paloaltonetworks.com/"&gt;https://threatvault.paloaltonetworks.com/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And the detail on this threat is then here.&lt;/P&gt;&lt;P&gt;&lt;A href="https://threatvault.paloaltonetworks.com/Home/ThreatDetail/31339" title="https://threatvault.paloaltonetworks.com/Home/ThreatDetail/31339"&gt;https://threatvault.paloaltonetworks.com/Home/ThreatDetail/31339&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the result is that this is an attack on windows servers in your environment.&amp;nbsp; So the challenge now is to see which of your workstations are responsible for sending out these packets.&amp;nbsp; This will be a manual process since all you have here in the logs is the bogus DHCP link local address.&amp;nbsp; You will need to trace back to the switches to see if you can associate this traffic with mac addresses as some point in the chain. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once you find the computers responsible you will need to clean whatever malware on them is creating this traffic.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 14 Aug 2014 21:20:29 GMT</pubDate>
    <dc:creator>pulukas</dc:creator>
    <dc:date>2014-08-14T21:20:29Z</dc:date>
    <item>
      <title>THREAT ALERT : high : 169.254.254.238 -&gt; 169.254.255.255 Microsoft Windows NAT Helper DNS Query Denial of Service(31339) alert</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-alert-high-169-254-254-238-gt-169-254-255-255-microsoft/m-p/28348#M20715</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Team,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We got the below threat alert from the panorama and not able to understand the most of the part , like source and Destination . Both IP looks the outside my network but still its showing the rule: Outbound_Default_URL_IPS . One of my outbound policy with threat prevention rule. Can any one please explain me this .&lt;/P&gt;&lt;P&gt;Wondering How can an external IP be the source IP on an internal interface of the firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THREAT ALERT : high : 169.254.254.238 -&amp;gt; 169.254.255.255 Microsoft Windows NAT Helper DNS Query Denial of Service(31339) alert &lt;/P&gt;&lt;P&gt;domain: 1&lt;BR /&gt; receive_time: 2014/08/13 03:10:35&lt;BR /&gt; serial: 001801004403&lt;BR /&gt; seqno: 30536660&lt;BR /&gt; actionflags: 0x0&lt;BR /&gt; type: THREAT&lt;BR /&gt; subtype: vulnerability&lt;BR /&gt; config_ver: 1&lt;BR /&gt; time_generated: 2014/08/13 03:10:30&lt;BR /&gt; src: 169.254.254.238&lt;BR /&gt; dst: 169.254.255.255&lt;BR /&gt; natsrc: &lt;BR /&gt; natdst: &lt;BR /&gt; rule: Outbound_Default_URL_IPS&lt;BR /&gt; srcuser: &lt;BR /&gt; dstuser: &lt;BR /&gt; srcloc: 169.254.0.0-169.254.255.255&lt;BR /&gt; dstloc: 169.254.0.0-169.254.255.255&lt;BR /&gt; app: dns&lt;BR /&gt; vsys: vsys1&lt;BR /&gt; from: trust&lt;BR /&gt; to: untrust&lt;BR /&gt; inbound_if: ethernet1/2&lt;BR /&gt; outbound_if: ethernet1/1&lt;BR /&gt; logset: Panorama&lt;BR /&gt; time_received: 2014/08/13 03:10:34&lt;BR /&gt; sessionid: 7567&lt;BR /&gt; repeatcnt: 1&lt;BR /&gt; sport: 53&lt;BR /&gt; dport: 53&lt;BR /&gt; natsport: 0&lt;BR /&gt; natdport: 0&lt;BR /&gt; flags: 0x80000000&lt;BR /&gt; proto: udp&lt;BR /&gt; action: alert&lt;BR /&gt; cpadding: 0&lt;BR /&gt; threatid: Microsoft Windows NAT Helper DNS Query Denial of Service(31339)&lt;BR /&gt; category: any&lt;BR /&gt; contenttype: &lt;BR /&gt; behavior: 0x0400000000000000000000000000000000000000000000000000000000000000&lt;BR /&gt; severity: high&lt;BR /&gt; direction: client-to-server&lt;BR /&gt; misc: &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Aug 2014 19:52:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-alert-high-169-254-254-238-gt-169-254-255-255-microsoft/m-p/28348#M20715</guid>
      <dc:creator>tiwara</dc:creator>
      <dc:date>2014-08-14T19:52:10Z</dc:date>
    </item>
    <item>
      <title>Re: THREAT ALERT : high : 169.254.254.238 -&gt; 169.254.255.255 Microsoft Windows NAT Helper DNS Query Denial of Service(31339) alert</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-alert-high-169-254-254-238-gt-169-254-255-255-microsoft/m-p/28349#M20716</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The address is not outside your network, these are the reserved addresses for DHCP local link autoconfiguration when no DHCP server is seen by a client requesting a DHCP address.&amp;nbsp; You can see the RFC and a general description on the web sites here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://tools.ietf.org/html/rfc3927" title="http://tools.ietf.org/html/rfc3927"&gt;RFC 3927 - Dynamic Configuration of IPv4 Link-Local Addresses&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.tcpipguide.com/free/t_DHCPAutoconfigurationAutomaticPrivateIPAddressingA.htm" title="http://www.tcpipguide.com/free/t_DHCPAutoconfigurationAutomaticPrivateIPAddressingA.htm"&gt;The TCP/IP Guide - DHCP Autoconfiguration / Automatic Private IP Addressing (APIPA)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For any threat the place to go is search of the threat vault for the detail.&amp;nbsp; Take the threat number and plug it into the search form here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://threatvault.paloaltonetworks.com/" title="https://threatvault.paloaltonetworks.com/"&gt;https://threatvault.paloaltonetworks.com/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And the detail on this threat is then here.&lt;/P&gt;&lt;P&gt;&lt;A href="https://threatvault.paloaltonetworks.com/Home/ThreatDetail/31339" title="https://threatvault.paloaltonetworks.com/Home/ThreatDetail/31339"&gt;https://threatvault.paloaltonetworks.com/Home/ThreatDetail/31339&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the result is that this is an attack on windows servers in your environment.&amp;nbsp; So the challenge now is to see which of your workstations are responsible for sending out these packets.&amp;nbsp; This will be a manual process since all you have here in the logs is the bogus DHCP link local address.&amp;nbsp; You will need to trace back to the switches to see if you can associate this traffic with mac addresses as some point in the chain. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once you find the computers responsible you will need to clean whatever malware on them is creating this traffic.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Aug 2014 21:20:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-alert-high-169-254-254-238-gt-169-254-255-255-microsoft/m-p/28349#M20716</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2014-08-14T21:20:29Z</dc:date>
    </item>
    <item>
      <title>Re: THREAT ALERT : high : 169.254.254.238 -&gt; 169.254.255.255 Microsoft Windows NAT Helper DNS Query Denial of Service(31339) alert</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-alert-high-169-254-254-238-gt-169-254-255-255-microsoft/m-p/28350#M20717</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I hate to sound like a wet blanket, but we see a lot of false positives from PA's threat signature engine. So &lt;A href="https://live.paloaltonetworks.com/u1/15598"&gt;tiwara&lt;/A&gt; I would suggest you be careful in "jumping the gun" and assuming the client is infected... it might just be normal Windows behavior&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Aug 2014 12:52:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-alert-high-169-254-254-238-gt-169-254-255-255-microsoft/m-p/28350#M20717</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2014-08-15T12:52:57Z</dc:date>
    </item>
    <item>
      <title>Re: THREAT ALERT : high : 169.254.254.238 -&gt; 169.254.255.255 Microsoft Windows NAT Helper DNS Query Denial of Service(31339) alert</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-alert-high-169-254-254-238-gt-169-254-255-255-microsoft/m-p/28351#M20718</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;We again got the same alert from the PA threat engine , however we are not able to find the IP in the network , also its not associated to any of the web server. If its a false positive how we can stop these alerts top generate.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Amber&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Aug 2014 14:57:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-alert-high-169-254-254-238-gt-169-254-255-255-microsoft/m-p/28351#M20718</guid>
      <dc:creator>tiwara</dc:creator>
      <dc:date>2014-08-18T14:57:23Z</dc:date>
    </item>
    <item>
      <title>Re: THREAT ALERT : high : 169.254.254.238 -&gt; 169.254.255.255 Microsoft Windows NAT Helper DNS Query Denial of Service(31339) alert</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-alert-high-169-254-254-238-gt-169-254-255-255-microsoft/m-p/28352#M20719</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Amber,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can create a threat exception by clicking on the name of the threat in the threat log. The pop-up window will allow you to select which security profile to add the exemption and also add an IP address if you only want to turn the signature off for a specific IP address as opposed to turning the signature off for the entire security profile.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alfred&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Aug 2014 22:04:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-alert-high-169-254-254-238-gt-169-254-255-255-microsoft/m-p/28352#M20719</guid>
      <dc:creator>fredallee</dc:creator>
      <dc:date>2014-08-18T22:04:37Z</dc:date>
    </item>
    <item>
      <title>Re: THREAT ALERT : high : 169.254.254.238 -&gt; 169.254.255.255 Microsoft Windows NAT Helper DNS Query Denial of Service(31339) alert</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-alert-high-169-254-254-238-gt-169-254-255-255-microsoft/m-p/28353#M20720</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Awesome ... Completed. Thanks Everyone &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Aug 2014 16:17:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-alert-high-169-254-254-238-gt-169-254-255-255-microsoft/m-p/28353#M20720</guid>
      <dc:creator>tiwara</dc:creator>
      <dc:date>2014-08-19T16:17:47Z</dc:date>
    </item>
    <item>
      <title>Re: THREAT ALERT : high : 169.254.254.238 -&gt; 169.254.255.255 Microsoft Windows NAT Helper DNS Que</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-alert-high-169-254-254-238-gt-169-254-255-255-microsoft/m-p/302858#M78889</link>
      <description>&lt;P&gt;I know it was an old thread. Sorry for that.&lt;/P&gt;&lt;P&gt;I work on PANOS 9.0.5.and I see a lot a this Alert every day . According to &lt;SPAN class="multi-rows"&gt;&lt;SPAN&gt;CVE-2006-5614, this threat use Windows XP process. However, all my computers are on Windows 10 1909 and no viruses were detected on. Other strange fact is the target. The "threat" don't aim DNS server but the Gateway (here PA850). &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="multi-rows"&gt;&lt;SPAN&gt;For you , is this a false positive ? Shall i open a case?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="multi-rows"&gt;&lt;SPAN&gt;Thanks for your help.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Dec 2019 09:27:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-alert-high-169-254-254-238-gt-169-254-255-255-microsoft/m-p/302858#M78889</guid>
      <dc:creator>ENSANANTES</dc:creator>
      <dc:date>2019-12-10T09:27:11Z</dc:date>
    </item>
    <item>
      <title>Re: THREAT ALERT : high : 169.254.254.238 -&gt; 169.254.255.255 Microsoft Windows NAT Helper DNS Que</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-alert-high-169-254-254-238-gt-169-254-255-255-microsoft/m-p/594240#M118268</link>
      <description>&lt;P&gt;I have the same problem. Host is working on Windows 10 and is targeting not the DNS server, but the Gateway.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2024 14:07:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-alert-high-169-254-254-238-gt-169-254-255-255-microsoft/m-p/594240#M118268</guid>
      <dc:creator>Wszebor</dc:creator>
      <dc:date>2024-08-07T14:07:55Z</dc:date>
    </item>
  </channel>
</rss>

