| VID |
24065 |
| Severity |
40 |
| Port |
707 |
| Protocol |
TCP |
| Class |
BackDoor |
| Detailed Description |
The Welchia worm seems to be infected on the Windows system. The Welchia worm propagates by exploiting the vulnerability described in Microsoft Security Bulletin MS03-026, titled, "Buffer Overrun In RPC Interface Could Allow Code Execution" announced July 16, 2003. The worm also attempts to spread using a buffer overflow exploit for the WebDav vulnerability (described in Microsoft Security Bulletin MS03-007) using TCP port 80.
W32.Welchia.Worm does the following: - Attempts to download the DCOM RPC patch from Microsoft's Windows Update Web site, install it, and then reboot the computer. - Checks for active machines to infect by sending an ICMP echo request, or PING, which will result in increased ICMP traffic. - Attempts to remove W32.Blaster.Worm. - Installs a TFTP server on all the infected machines. - Creates a remote shell on the vulnerable host that will reconnect to the attacking computer on a 707/tcp port to receive instructions.
* References: http://www3.ca.com/solutions/collateral.asp?CT=27081&CID=49258 http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_MSBLAST.D http://www.sophos.com/virusinfo/analyses/w32nachia.html http://securityresponse.symantec.com/avcenter/venc/data/w32.welchia.worm.html http://home.ahnlab.com/smart2u/virus_detail_1206.html http://xforce.iss.net/xforce/alerts/id/150 http://www.cert.org/advisories/CA-2003-19.html http://www.microsoft.com/technet/security/bulletin/MS03-026.asp
* Platforms Affected: Microsoft IIS Microsoft Windows Any version |
| Recommendation |
Remove it from the infected computer by using a anti-virus program (vaccine program). If you do not have an anti-virus program installed, download and install one of the following free worm cleaners: 1. Trend Micro System Cleaner at http://www.trendmicro.com/download/tsc.asp 2. CA Virus Information Center Cleaning Utility at http://www3.ca.com/Files/VirusInformationAndPrevention/ClnNachi.zip 3. Symantec DCOM Cleaner at http://securityresponse.symantec.com/avcenter/venc/data/w32.welchia.worm.removal.tool.html 4. SOPHOS W32/Nachi-A Cleaner at http://www.sophos.com/support/disinfection/nachia.html
-- AND --
Apply the appropriate patch for your system, as listed in Microsoft's security bulletin MS03-026 at http://www.microsoft.com/technet/security/bulletin/ms03-026.asp And If an IIS Web server is running on the system and has not been applied the patch for the WebDav vulnerability described in Microsoft Security Bulletin MS03-007, apply the appropriate patch for your system at http://www.microsoft.com/technet/security/bulletin/ms03-007.asp |
| Related URL |
CVE-2003-0109,CVE-2003-0352 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|