INDEPENDENT NEWS

Symantec: W32.Blaster.Worm - Upgraded To Level 4

Published: Wed 13 Aug 2003 09:28 AM
UPDATE: 13th August 2003:
RE: Microsoft New Zealand
Note to Editor:
If you are covering this security issue, Microsoft would appreciate that you use the following URLs and Phone numbers rather than any previously issued.
Phone: 0800 800 004.
Website: http://www.microsoft.com/security
Thank you for your assistance.
Megan Rosier
AUGUST.ONE COMMUNICATIONS
******* Symantec: W32.Blaster.Worm - Upgraded To Level 4
Further to yesterday's announcement, Symantec Security Response has upgraded W32.Blaster.Worm from a Level 3 (moderate) to a Level 4 (high) threat, in response to an increased number of submissions from customers and information from Symantec's Deepsight Threat Management System.
W32.Blaster.Worm exploits the Microsoft DCOM RPC Interface Buffer Overrun vulnerability. Due to the high number of users impacted by this vulnerability, Symantec has raised the ThreatCon to a Level 4. Systems affected include Microsoft IIS, Windows 2000, Windows XP and Windows NT.
W32.Blaster.Worm uses the DCOM MSRPC vulnerability to compromise a remote system. It attempts to connect to TCP port 4444 after the attack and then uses tftp to retrieve and install a copy of itself onto the infected system.
When the W32.Blaster.Worm is executed, it will do the following:
1. Adds the value: "windows auto update"="msblast.exe" to the registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run so that the worm runs when you start Windows.
2. Send data on TCP port 135 that may exploit the DCOM RPC vulnerability to allow the following actions to occur on vulnerable machine: the worm will be downloaded and will run using the program tftp.
Through analysis of the worm, Symantec has determined that it contains code to launch a Denial-of-Service attack against windowsupdate.com during a specific time period. The worm will launch a Denial-of-Service attack after August 15th through the end of the year, every year.
Microsoft issued a patch for this vulnerability on July 16th. Symantec Security Response strongly encourages users to patch systems. The patch is available at http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-026.asp
More information on this worm and how to delete and scan for infected files can be found on the Symantec Security Response website - http://securityresponse.symantec.com/avcenter/venc/data/w32.blaster.worm.html
ENDS

Next in Business, Science, and Tech

Gaffer Tape And Glue Delivering New Zealand’s Mission Critical Services
By: John Mazenier
Ivan Skinner Award Winner Inspired By Real-life Earthquake Experience
By: Earthquake Commission
Consultation Opens On A Digital Currency For New Zealand
By: Reserve Bank
Ship Anchors May Cause Extensive And Long-lasting Damage To The Seafloor, According To New NIWA Research
By: NIWA
A Step Forward For Simpler Trade Between New Zealand And Singapore
By: New Zealand Customs Service
68% Say Make Banks Offer Fraud Protection
By: Horizon Research Limited
View as: DESKTOP | MOBILE © Scoop Media