News

'White Hat' Worm Tries to Remove Blaster

In what appears to be a misguided attempt to do good, someone released a worm that exploits the same DCOM RPC vulnerability that enabled the Blaster worm but that attempts to automatically download the Microsoft patch and remove the Blaster worm if it's present.

Security vendors assigned the names Welchia, Blaster-D and Nachi to the worm. Symantec rated the worm a 4 in severity on its 5-point threat scale.

In addition to exploiting the DCOM RPC vulnerability patched in MS03-026, to target and modify Windows XP systems, Welchia also exploits the WebDAV vulnerability patched even earlier with MS03-007, to target Windows 2000 systems running IIS 5.0.

Symantec warns that the worm causes system instability due to an RPC service crash on Windows 2000 machines and compromises system security by installing a Trivial File Transfer Protocol (TFTP) server on all infected machines. Microsoft officials added that the worm generates excess network traffic.

About the Author

Scott Bekker is editor in chief of Redmond Channel Partner magazine.

Featured

  • Black Box

    Microsoft Releases Windows Server 2022 Preview

    Microsoft announced during its Ignite event that Window Server 2022 is currently availability at the preview stage.

  • Azure Networking Enhancements Announced at Ignite

    Azure networking improvements were announced by Microsoft as part of its Ignite Conference.

  • How To Reclaim Your Privacy from Windows 10, Part 2

    These are the top four privacy settings to check in your Windows device to make sure Microsoft doesn't collect any data you don't want it to.

  • Microsoft Releases Out-of-Band Security Patches for Exchange Server

    Microsoft on Tuesday released out-of-band security patches for Exchange Server to address multiple zero-day flaws that are currently being exploited in active attacks.

comments powered by Disqus