Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: all
until you deal with this,

turn 'auto-preview' OFF in your email app !

as far as i can tell, only Outlook and Outlook Express are vulnerable to this virus

1,029 posted on 04/27/2002 4:55:40 AM PDT by tomkat
[ Post Reply | Private Reply | To 1027 | View Replies ]


To: all
Category 4

W32.Klez.gen@mm

Discovered on: November 9, 2001
Last Updated on: April 26, 2002 at 04:26:45 PM PDT

Due to an increased number of submissions, this threat has been upgraded to Category 4.

W32.Klez.gen@mm is a generic detection that detects variants of W32.Klez. Computers that are infected with W32.Klez.gen@mm are most likely infected with either W32.Klez.E@mm or W32.Klez.H@mm. Please refer to the appropriate write-ups for more information.

Removal tool
Symantec has provided a tool to remove infections of W32.Klez.E@mm, W32.Klez.H@mm, W32.ElKern.3587, and W32.ElKern.4926. If your computer is detected as infected with W32.Klez.gen@mm, download and run the tool. In most case, the tool will be able to remove the infection. Click here to obtain the tool.

This is the easiest way to remove these threats and should be tried first.



Type: Virus, Worm
Infection Length: Varies

November 9, 2001

November 9, 2001

*

Intelligent Updater virus definitions are released daily, but require manual download and installation.
Click here to download manually.

**

LiveUpdate virus definitions are usually released every Wednesday.
Click here for instructions on using LiveUpdate.

threat assessment

Wild:

Threat Metrics

Medium Medium High

Wild:
Medium

Damage:
Medium

Distribution:
High


Damage:

Distribution:

technical details

W32.Klez.gen@mm is a mass-mailing worm that searches the Windows address book for email addresses and sends messages to all recipients that it finds. The worm uses its own SMTP engine to send the messages.

The subject and attachment name of incoming emails is randomly chosen. The attachment will have one of the following extensions: .bat, .exe, .pif or .scr.

The worm exploits a vulnerability in Microsoft Outlook and Outlook Express in an attempt to execute itself when you open or even preview the message. Information and a patch for the vulnerability can be found at

http://www.microsoft.com/technet/security/bulletin/MS01-020.asp.
W32.Klez.gen@mm attempts to copy itself to all network shared drives that it finds.

Depending on which variant of the worm, the worm will drop one of the following viruses:

which will then infect the system.

1,030 posted on 04/27/2002 5:05:42 AM PDT by tomkat
[ Post Reply | Private Reply | To 1029 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson