Jump to content

New RPC vulnerability worm


Peachy

Recommended Posts

So...Apparently, there is a new RPC worm spreading that infects hosts the same way as Blaster. But there is a twist. Apparently, this worm removes Blaster and then downloads a bunch of Microsoft security patches, then sets itself to delete itself on January 1, 2004. I kid you not!

Link to comment
Share on other sites

So...Apparently, there is a new RPC worm spreading that infects hosts the same way as Blaster. But there is a twist. Apparently, this worm removes Blaster and then downloads a bunch of Microsoft security patches, then sets itself to delete itself on January 1, 2004. I kid you not!
sounds like Microsoft made this pro-active 'good' worm. :D which leads me to a question; is releasing a 'good' worm or virus that fixes computers automatically also illegal? i mean, could FBI bust down your door if you make a good virus? like one that wipes XP from your computer and installs SuSE? B)
Link to comment
Share on other sites

nlinecomputers

I doubt that Microsoft released this. This isn't any better then the first worm. What if Microsoft changes the download location of the patch? Will the worm crash or cause more problems? Can some one exploit the worm and piggyback a trojan on the fix-it worm? Could someone spoof Microsoft website and send a spoofed patch to you? Thanks but no thanks I'll patch my own system.

Link to comment
Share on other sites

I doubt that Microsoft released this.
i know, i was kidding. :D it's probably some work of a script kiddie who wants to do something to stop the blaster worm. basically, a mis-guided hacker.
Link to comment
Share on other sites

They actually had an article in today's LA Times Business section on it!I did a little search on this and I got a giggle out of it! :blink: I guess it is mostly infecting machines in Asia (Japan/China/S.Korea)!It goes under a few different aliases like "Nachi Worm", "Blaster-D/Nachi", "Worm_MSBLAST.D", "W32.Welchia.Worm", "W32.Nachi.worm", and "Welchia"!This malware also exploits the RPC DCOM Buffer Overflow, and instructs target systems to download its copy from the affected system using TFTP (Trivial File Transfer Protocol).Couple of other sources for reading up on it are: http://www.computerworld.com/securitytopic...1,84126,00.html andhttp://www.trendmicro.com/vinfo/virusencyc...=WORM_MSBLAST.DTrendMicro also provides a fix for it at http://www.trendmicro.com/ftp/products/tsc...sc/sysclean.com

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...