***VIRUS ALERT!!!!! RPC EXPLOIT ATTACKS!! YOU NEED TO INSTALL THE HOTFIX NOW!!!!
Posted: Mon Aug 11, 2003 4:15 pm
*Update*
w32.blaster.worm
http://securityresponse.symantec.com/av ... .worm.html
Removal tool:
http://securityresponse.symantec.com/av ... .tool.html
More info on the worm:
http://www.trendmicro.com/vinfo/virusen ... _MSBLAST.A
That link also has a removal tool and instructions if the others fails.
http://www.trendmicro.com/download/tsc.asp
Be sure to select the correct link, if you are a trend user or non user.
-----------------------------
This is the one they've been warning us about the past couple of weeks. It's happening now.
I've had 4 clients and my own laptop have this problem today (I patched all my home systems a month ago but I forgot to patch my laptop).
This is a security hole in all flavors of Windows EXCEPT 98 and 98. All of the systems affected were using Earthlink for their ISP so I suspect some infected system is port scanning all of Earthlink's IP addresses.
While under attack you will get an error message saying that the "RPC Service has been terminated unexpectedly" (if you check the Event log it shows up as an event ID 7031) and the computer will shut down in 15 seconds. The computer shuts down and reboots.
Here's what it looks like (thanks for the pic d_b):

This will happen while online (broadband or dialup) and if you have NOT installed the MS03-026 (Hotfix 823980) patch.
A mass mailing worm that already well established on thousands of infected systems is trying to use this exploit to hack into unpatched systems. The reboot apparently occurs because the worm is trying to disable your RPC service to hack into your computer and fails, causing the error.
If you haven't applied it yet, EVERYONE you MUST install the hotfix which you can get here:
http://www.microsoft.com/technet/treevi ... 03-026.asp
It's a 1.2Mb patch and will fit on a floppy. Carry it in your briefcase - your friends will all be having problems with this.
You may have a problem downloading the patch since if your system is under attack it will be rebooting every few minutes while online.
Easy workaround is to block port 135 if you're using a firewall, or just turn on WinXP's built in firewall temporarily (it apparently blocks port 135).
IT'S IMPORTANT YOU INSTALL THIS PATCH EVEN IF YOU HAVEN'T BEEN AFFECTED! This is a serious security exploit that can leave you system wide open to attack.
Those of you using routers may not be seeing any problems because your router is probably blocking port 135, but you should install the patch anyway.
w32.blaster.worm
http://securityresponse.symantec.com/av ... .worm.html
Removal tool:
http://securityresponse.symantec.com/av ... .tool.html
More info on the worm:
http://www.trendmicro.com/vinfo/virusen ... _MSBLAST.A
That link also has a removal tool and instructions if the others fails.
http://www.trendmicro.com/download/tsc.asp
Be sure to select the correct link, if you are a trend user or non user.
-----------------------------
This is the one they've been warning us about the past couple of weeks. It's happening now.
I've had 4 clients and my own laptop have this problem today (I patched all my home systems a month ago but I forgot to patch my laptop).
This is a security hole in all flavors of Windows EXCEPT 98 and 98. All of the systems affected were using Earthlink for their ISP so I suspect some infected system is port scanning all of Earthlink's IP addresses.
While under attack you will get an error message saying that the "RPC Service has been terminated unexpectedly" (if you check the Event log it shows up as an event ID 7031) and the computer will shut down in 15 seconds. The computer shuts down and reboots.
Here's what it looks like (thanks for the pic d_b):

This will happen while online (broadband or dialup) and if you have NOT installed the MS03-026 (Hotfix 823980) patch.
A mass mailing worm that already well established on thousands of infected systems is trying to use this exploit to hack into unpatched systems. The reboot apparently occurs because the worm is trying to disable your RPC service to hack into your computer and fails, causing the error.
If you haven't applied it yet, EVERYONE you MUST install the hotfix which you can get here:
http://www.microsoft.com/technet/treevi ... 03-026.asp
It's a 1.2Mb patch and will fit on a floppy. Carry it in your briefcase - your friends will all be having problems with this.
You may have a problem downloading the patch since if your system is under attack it will be rebooting every few minutes while online.
Easy workaround is to block port 135 if you're using a firewall, or just turn on WinXP's built in firewall temporarily (it apparently blocks port 135).
IT'S IMPORTANT YOU INSTALL THIS PATCH EVEN IF YOU HAVEN'T BEEN AFFECTED! This is a serious security exploit that can leave you system wide open to attack.
Those of you using routers may not be seeing any problems because your router is probably blocking port 135, but you should install the patch anyway.
