Microsoft Security Bulletin MS03-026: Buffer Overrun In RPC Interface Could Allow Code Execution(Q823980) was sent on 17th of last month .. use the auto update thing peps anyway
FYI:
TrendLabs has received several infection reports of this new worm named WORM_MSBLAST.A which exploits the RPC DCOM BUFFER OVERFLOW, a vulnerability in a Windows Distributed Component Object Model (DCOM) Remote Procedure Call (RPC) interface which allows an attacker to gain full access and execute any code on a target machine, leaving it compromised.
This worm has been observed to continuously scan and send data to vulnerable systems in the network using port 135. When the system date is August 15, it performs a Distributed Denial Of Service attack against windowsupdate.com.
As of 1:54 PM, US Pacific Time, Trend has declared a yellow alert to control the spread of this malware.
Please inform us if there are any infection reports in your region.
Seems the NT admins pushed the patch on all clients here.
Just got off the phone with a mate who is an admin here and he is saying they found infected machines that where patched.
They are still looking at how this happend
The issue manifests itself by causing the PC to contunally reboot & will also stop some functionality (i.e.drag & drop, may disable the mouse or causes the screen to freeze amongst others.) If you receive a call with these symptoms please advise the customer that you are about to offer courtesy support only as we do not support virus clearance but recommend they do the following....
Well, a guildie told of of this tool earlier today. Sadly I already formatted and reinstalled.....ah well..a fresh new OS has its appeal aswell...the damn machine was getting a bit slow lately anyway
Once MSBlast.exe is on your computer and running (if its there, its running) you cannot simply "delete" it.
You have to kill the Registry entry that tells the fiel to load on windows start-up. Then Reboot.
After the reboot the virus will be present on your PC but wont actually be running, at this point you can delete it.
We have just installed SP4 for Win2k around my office, after the machines has been checked/cleaned. This seems to have removed all the problems associated with this virus (the svchost generateing errors, the rebooting etc)
Huge file, but if youve got Win2k, download the service pack and install it... seems to have worked for us, no more reinfections (yet)
sure this acts as a warning to people to look for updates on their virus programs every day....thats what I do and have had no problems at all with it even though it seems to have affected around 75% of people I have talked to
Its a windows exploit not a virus that caused this chaos, ppl should keep winblows up to date as well as virus checkers, the exploit lets ppl get inside and upload all sorts of things with remote tools, winvnc etc..
any1 with firewall/keeps windows up to date wouldent of been affected
LOl didnt realise this was here, anyway i put a bit in the DAOC general discussion board as its not really server specific , anyway heres link. Theres a link there to a nice little program that will purge the virus for u
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.