| VID |
24062 |
| Severity |
40 |
| Port |
1080 |
| Protocol |
TCP |
| Class |
BackDoor |
| Detailed Description |
The Bugbear.B worm's backdoor is detected. BugBear.B backdoor is a part of the BugBear.B worm, which includes a key logger and can kill antivirus or personal firewall softwares. The BugBear.B worm spreads by sending emails containing attachments and by locating shared resources on your network to which it can copy itself. The worm has a backdoor component similar to the one used in its previous version. The backdoor listens to TCP port 1080 for commands from a remote host. A hacker can connect to the backdoor and perform the following action:
- get information about infected computer - upload and download files - start files - delete files - terminate processes - get process list - start keylogger - start HTTP server on a selected port
The Bugbear.B worm's backdoor does not use secure authentication like its previous variant, so the backdoor can be used by many hackers, not just the worm's author.
* References: http://www.sophos.com/virusinfo/analyses/w32bugbearb.html http://www.f-secure.com/v-descs/bugbear_b.shtml http://securityresponse.symantec.com/avcenter/venc/data/w32.bugbear.b@mm.html
* Platforms Affected: Microsoft Windows Any version |
| Recommendation |
1. Use Anti-Virus programs or free disinfection tools to remove it. 2. Close the Windows shares of the infected computer. 3. Update Outlook, Internet Explorer browser and Outlook Express in the infected computer. The patch can be downloaded from Microsoft Security Bulletin MS01-027. (This patch was released to fix a number of vulnerabilities in Microsoft's software, including the ones exploited by this worm.): http://www.microsoft.com/technet/security/bulletin/MS01-027.asp
Free BugBear.B worm disinfection tool: ftp://ftp.f-secure.com/anti-virus/tools/f-bugbr.zip http://www.symantec.com/avcenter/venc/data/w32.bugbear.b@mm.removal.tool.html |
| Related URL |
CVE-2001-0154 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|