Posted on 02/14/2004 7:44:02 AM PST by FourPeas
As of February 13, 2003, due to a increased rate of submissions, Symantec Security Response has upgraded this threat to a Category 3 from a Category 2.
W32.Welchia.B.Worm is a variant of W32.Welchia.Worm. If the version of the operating system of the infected machine is Chinese, Korean, or English, the worm will attempt to download the Microsoft Workstation Service Buffer Overrun and Microsoft Messenger Service Buffer Overrun patches from the Microsoft® Windows Update Web site, install it, and then restart the computer.
The worm also attempts to remove W32.Mydoom.A@mm and W32.Mydoom.B@mm worms.
W32.Welchia.B.Worm exploits multiple vulnerabilities, including:
The DCOM RPC vulnerability (described in Microsoft Security Bulletin MS03-026) using TCP port 135. The worm specifically targets Windows XP machines using this exploit. The WebDav vulnerability (described in Microsoft Security Bulletin MS03-007) using TCP port 80. The worm specifically targets machines running Microsoft IIS 5.0 using this exploit. The worm's use of this exploit will impact Windows 2000 systems and may impact Windows NT/XP systems. The Workstation service buffer overrun vulnerability (described in Microsoft Security Bulletin MS03-049) using TCP port 445. The Locator service vulnerability using TCP port 445 (described in Microsoft Security Bulletin MS03-001). The worm specifically targets Windows 2000 machines using this exploit.
The presence of the file, %Windir%\system32\drivers\svchost.exe, is an indication of a possible infection.
This threat is compressed with UPX.
(Excerpt) Read more at sarc.com ...
That being said:
Svchost.exe is a generic host process name for services that are run from dynamic-link libraries (DLLs). The Svchost.exe file is located in the %SystemRoot%\System32 folder. At startup, Svchost.exe checks the services portion of the registry to construct a list of services that it needs to load. There can be multiple instances of Svchost.exe running at the same time. Each Svchost.exe session can contain a grouping of services, so that separate services can be run depending on how and where Svchost.exe is started. This allows for better control and debugging.
Interesting. I haven't seen a single instance of mydoom at home, although the server at work logs several a day. I wonder if some ISPs are filtering them out. I certainly got hit by Klez before installing Norton.
The only good thing about WinME (which I have -- yes, its a long, sad story, no, I don't want to talk about it) is that no one bothers to attack it. It causes enough headaches on its own.
Even hackers have a compassionate side. :) My condolences on your operating system.
I don't know whether to laugh or cry.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.