You are missing our premiere tool bar navigation system! Register and use it for FREE!

NukeCops  
•  Home •  Downloads •  Gallery •  Your Account •  Forums • 
Readme First
- Readme First! -

Read and follow the rules, otherwise your posts will be closed
Modules
· Home
· FAQ
· Buy a Theme
· Advertising
· AvantGo
· Bookmarks
· Columbia
· Community
· Donations
· Downloads
· Feedback
· Forums
· PHP-Nuke HOWTO
· Private Messages
· Search
· Statistics
· Stories Archive
· Submit News
· Surveys
· Theme Gallery
· Top
· Topics
· Your Account
Who's Online
There are currently, 670 guest(s) and 0 member(s) that are online.

You are Anonymous user. You can register for free by clicking here
SEVERITY: CRITICAL New Worm: Nachi, Blaster-D, Welchia
SecurityStylee writes "Heads up gang another new worm is out in the wild - this time it
leverages the exploits patched in MS03-026 as well as MS03-007.

New Worm: Nachi, Blaster-D, Welchia

SEVERITY: CRITICAL
DATE: 08/18/2003
PRODUCTS AFFECTED: Windows 2000 and XP, Internet Information Services
5.0

**********************************************************************

WHAT IS IT?
A new worm is spreading in the wild. The Microsoft Product Support
Services Security Team is issuing this alert to advise customers to be
on the alert for this virus as it spreads in the wild. Customers are
advised to review the information and take the appropriate action for
their environments.

IMPACT OF ATTACK: Network Propagation, Patch Installation

TECHNICAL DETAILS:
Similar to the earlier Blaster worm and its variants, this worm also
exploits the vulnerability patched by Microsoft Security Bulletin
MS03-026, and instructs target systems to download its copy from the
affected system using the TFTP program.

In addition to exploiting the RPC vulnerability patched by Microsoft
Security Bulletin MS03-026 this worm also uses a previously patched
vulnerability in Microsoft Security Bulletin MS03-007 directed at IIS
5.0 over port 80 to propagate to un-patched systems.

In addition upon successful infection this worm also patches systems
with the patch for Microsoft Security Bulletin MS03-026. It does this by
first determining the operating system and then downloading the
associated patch for that operating system.

For additional details on this worm from anti-virus software vendors
participating in the Microsoft Virus Information Alliance (VIA) please
visit the following links:

Network Associates:

http://vil.nai.com/vil/content/v_100559.htm

Trend Micro:

http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_MSB
LAST.D

Symantec

http://securityresponse.symantec.com/avcenter/venc/data/w32.welchia.worm
.html

For more information on Microsoft's Virus Information Alliance please
visit this link: http://www.microsoft.com/technet/security/virus/via.asp


Please contact your Antivirus Vendor for additional details on this
virus.

PREVENTION:
Turn on Internet Connection Firewall (Windows XP or Windows Server 2003)
or use a third party firewall to block incoming TCP ports 80, 135, 139,
445 and 593; UDP ports 135, 137, 38.

To enable the Internet Connection Firewall in Windows XP please see the
instructions below or visit this KnowledgeBase Article:
http://support.microsoft.com/?id=283673

* In Control Panel, double-click Networking and Internet
Connections, and then click Network Connections.
* Right-click the connection on which you would like to enable
ICF, and then click Properties.
* On the Advanced tab, click the box to select the option to
Protect my computer or network.

This worm utilizes two previously-announced vulnerabilities as part of
its infection method. Because of this, customers must ensure that their
computers are patched for the vulnerabilities that are identified in the
following Microsoft Security Bulletins.

Microsoft Security Bulletin MS03-026
http://www.microsoft.com/technet/security/bulletin/MS03-026.asp
Microsoft Security Bulletin MS03-007
http://www.microsoft.com/technet/security/bulletin/MS03-007.asp

In order to assist customers with the installation of the patch for
Microsoft Security Bulletin MS03-026 Microsoft has released a tool which
can be used to scan a network for the presence of systems which have not
had the MS03-026 patch installed. More details on this tool are
available in Microsoft Knowledge Base article 826369.

RECOVERY:
If your computer has been infected with this virus, please contact your
preferred antivirus vendor or Product Support Services for assistance
with removing it.

RELATED KB ARTICLES:
http://support.microsoft.com/default.aspx?scid=kb;en-us;826234
This article will be available within 24 hours.

RELATED SECURITY BULLETINS:
Microsoft Security Bulletin MS03-026
http://www.microsoft.com/technet/security/bulletin/MS03-026.asp
Microsoft Security Bulletin MS03-007
http://www.microsoft.com/technet/security/bulletin/MS03-007.asp

VIRUS ALERT LINK:
http://www.microsoft.com/technet/security/virus/alerts/nachi.asp

As always please make sure to use the latest Anti-Virus detection from
your Anti-Virus vendor to detect new viruses and their variants.

"
Posted on Tuesday, August 19 @ 16:00:00 CEST by Zhen-Xjell
 
Related Links
· Computer Cops
· More about Security
· News by Zhen-Xjell


Most read story about Security:
PHP-Nuke admin.php security hole - PATCHED

Article Rating
Average Score: 5
Votes: 1


Please take a second and vote for this article:

Excellent
Very Good
Good
Regular
Bad


Options

 Printer Friendly Page  Printer Friendly Page

 Send to a Friend  Send to a Friend

Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register

Re: SEVERITY: CRITICAL New Worm: Nachi, Blaster-D, Welchia (Score: 1)
by moogles on Tuesday, August 19 @ 16:49:22 CEST
(User Info | Send a Message)
Kinda curious, is it considered an actual virus if it infects machine open to another virus... then patches that machine to protect it from that virus?
In addition upon successful infection this worm also patches systems
with the patch for Microsoft Security Bulletin MS03-026. It does this by
first determining the operating system and then downloading the
associated patch for that operating system.

Wonder if it actually does any harm besides patching machines to protect you from MS Blast... O_o



Re: SEVERITY: CRITICAL New Worm: Nachi, Blaster-D, Welchia (Score: 1)
by allevon on Tuesday, August 19 @ 18:27:48 CEST
(User Info | Send a Message) http://www.AlleVonTech.com
See why I stay on 98. :)~

Call me safe and slow, but this is why I wait years to upgrade my crap. By then, the script kiddies are targeting only newer stuff and im all alone unaffected.

This one looks really nasty.



ROFLMAO (Score: 1)
by VinDSL on Wednesday, August 20 @ 05:57:40 CEST
(User Info | Send a Message) http://www.lenon.com/

Question: What's the difference between a Microsoft patch and a worm?

Answer: A worm works every time!


Powered by TOGETHER TEAM srl ITALY http://www.togetherteam.it - DONDELEO E-COMMERCE http://www.DonDeLeo.com - TUTTISU E-COMMERCE http://www.tuttisu.it
Web site engine's code is Copyright © 2002 by PHP-Nuke. All Rights Reserved. PHP-Nuke is Free Software released under the GNU/GPL license.
Page Generation: 0.078 Seconds - 312 pages served in past 5 minutes. Nuke Cops Founded by Paul Laudanski (Zhen-Xjell)
:: FI Theme :: PHP-Nuke theme by coldblooded (www.nukemods.com) ::