Avatar billede ng_tnt Nybegynder
19. august 2003 - 10:39 Der er 3 kommentarer og
1 løsning

Info om ny virus

Udpluk af en mail fra Microsoft......

Hej alle sammen,


Mange af jer er nok allerede informeret om nedenstående. Til de af jer, som
ikke er, vil jeg på det kraftigste anbefale, at i nærlæser information.

Kort info om den nye virus:

Efter at have inficieret en maskine, installerer virusen selv patchen for
MS03-026 !!! Dette gøres for at dække for dens spor, så maskinen ikke
optræder som ubeskyttet hvis man laver en scan efter maskiner, som mangler
patchen. Det vil kunne forvirre både mange hjemmebrugere og virksomheder.
Men maskinen er stadig inficeret.

I øvrigt prøver patchen også at udnytte et andet allerede kendt problem i
form af MS03-007. Så hvis nogle virksomheder derude kun har patchet for
MS03-026, kan de stadig blive ramt.
Avatar billede summer Mester
19. august 2003 - 11:22 #1
Prøv lige at lægge linket til Microsoft.
Safe2day skriver i dag: http://www.safe2day.dk/article.php?sid=1734
TipChannel: http://www.tipchannel.dk/kal3/17kb3/W32.Welchia/W32.Welchia.htm
Den nye hedder WORM_MSBLAST.D
Avatar billede ng_tnt Nybegynder
19. august 2003 - 14:19 #2
her er resten af teksten fra MS :

PSS Security Response Team Alert - New Worm: Nachi, Blaster-D, Welchia

SEVERITY: CRITICAL
DATE: 08/18/2003
PRODUCTS AFFECTED: Windows 2000 and XP, Internet Information Services 5.0

**********************************************************************

WHAT IS IT?
A new worm is spreading in the wild.  The Microsoft Product Support
Services Security Team is issuing this alert to advise customers to be on
the alert for this virus as it spreads in the wild.  Customers are advised
to review the information and take the appropriate action for their
environments.

IMPACT OF ATTACK: Network Propagation, Patch Installation

TECHNICAL DETAILS:
Similar to the earlier Blaster worm and its variants, this worm also
exploits the vulnerability patched by Microsoft Security Bulletin MS03-026,
and instructs target systems to download its copy from the affected system
using the TFTP program.

In addition to exploiting the RPC vulnerability patched by Microsoft
Security Bulletin MS03-026 this worm also uses a previously patched
vulnerability in Microsoft Security Bulletin MS03-007 directed at IIS 5.0
over port 80 to propagate to un-patched systems.

In addition upon successful infection this worm also patches systems with
the patch for Microsoft Security Bulletin MS03-026. It does this by first
determining the operating system and then downloading the associated patch
for that operating system.

For additional details on this worm from anti-virus software vendors
participating in the Microsoft Virus Information Alliance (VIA) please
visit the following links:

Network Associates:

http://vil.nai.com/vil/content/v_100559.htm

Trend Micro:

http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_MSBLAST.D

Symantec

http://securityresponse.symantec.com/avcenter/venc/data/w32.welchia.worm.html

For more information on Microsoft's Virus Information Alliance please visit
this link: http://www.microsoft.com/technet/security/virus/via.asp

Please contact your Antivirus Vendor for additional details on this virus.

PREVENTION:
Turn on Internet Connection Firewall (Windows XP or Windows Server 2003) or
use a third party firewall to block incoming TCP ports 80, 135, 139, 445
and 593; UDP ports 135, 137, 38.

To enable the Internet Connection Firewall in Windows XP please see the
instructions below or visit this KnowledgeBase Article:
http://support.microsoft.com/?id=283673

?    In Control Panel, double-click Networking and Internet Connections,
and then click Network Connections.
?    Right-click the connection on which you would like to enable ICF, and
then click Properties.
?    On the Advanced tab, click the box to select the option to Protect my
computer or network.

This worm utilizes two previously-announced vulnerabilities as part of its
infection method.  Because of this, customers must ensure that their
computers are patched for the vulnerabilities that are identified in the
following Microsoft Security Bulletins.

Microsoft Security Bulletin MS03-026
http://www.microsoft.com/technet/security/bulletin/MS03-026.asp
Microsoft Security Bulletin MS03-007
http://www.microsoft.com/technet/security/bulletin/MS03-007.asp

In order to assist customers with the installation of the patch for
Microsoft Security Bulletin MS03-026 Microsoft has released a tool which
can be used to scan a network for the presence of systems which have not
had the MS03-026 patch installed. More details on this tool are available
in Microsoft Knowledge Base article 826369.

RECOVERY:
If your computer has been infected with this virus, please contact your
preferred antivirus vendor or Product Support Services for assistance with
removing it.

RELATED KB ARTICLES:
http://support.microsoft.com/default.aspx?scid=kb;en-us;826234
This article will be available within 24 hours.

RELATED SECURITY BULLETINS:
Microsoft Security Bulletin MS03-026
http://www.microsoft.com/technet/security/bulletin/MS03-026.asp
Microsoft Security Bulletin MS03-007
http://www.microsoft.com/technet/security/bulletin/MS03-007.asp

VIRUS ALERT LINK:
http://www.microsoft.com/technet/security/virus/alerts/nachi.asp

As always please make sure to use the latest Anti-Virus detection from your
Anti-Virus vendor to detect new viruses and their variants.

If you have any questions regarding this alert please contact your
Technical Account Manager or Application Development Consultant.

PSS Security Response Team
Avatar billede summer Mester
22. december 2003 - 22:13 #3
Luk venligst spm.!
Avatar billede ng_tnt Nybegynder
23. februar 2004 - 14:33 #4
;-(
Avatar billede Ny bruger Nybegynder

Din løsning...

Tilladte BB-code-tags: [b]fed[/b] [i]kursiv[/i] [u]understreget[/u] Web- og emailadresser omdannes automatisk til links. Der sættes "nofollow" på alle links.

Loading billede Opret Preview
Kategori
IT-kurser om Microsoft 365, sikkerhed, personlig vækst, udvikling, digital markedsføring, grafisk design, SAP og forretningsanalyse.

Log ind eller opret profil

Hov!

For at kunne deltage på Computerworld Eksperten skal du være logget ind.

Det er heldigvis nemt at oprette en bruger: Det tager to minutter og du kan vælge at bruge enten e-mail, Facebook eller Google som login.

Du kan også logge ind via nedenstående tjenester