'Internet Firewall' + Recent MS Patch Useless Against Lovesan Worm

K

Knack

My laptop is on a dialup connection with dynamic IP addressing. I had the
Internet Firewall of WinXPH(SP1) enabled, and 10 days ago I did that *huge*
Microsoft patch, which was urgently advised. But yesterday I still got the
Lovsan worm. McAfee discovered this worm only yesterday. My system has since
been repaired.

There is a description of this worm and a link to a freely distributed
standalone AV program to repair your computer at
http://vil.nai.com/vil/content/v_100547.htm

Notice that the worm does not spread thru e-mail, but via scanning a random
IP range to look for vulnerable systems on TCP port 135. The worm attempts
to exploit the DCOM RPC vulnerability on the found systems to create a
remote shell on TCP port 4444. A good firewall should prevent that
intrusion, but obviously the standard one included with WinXPH is
inadequate.
 
K

Knack

Sorry for the misinformation folks.

No, I just discovered that I had every dial-up number connection protected
with XP's 'Internet Connection Firewall' *except* the default connection
:-( Alas, ICF was disabled on that one and that was the one in use yesterday
when the Lovsan (msblast) worm penetrated my system.

Still though, Microsoft patch 823980 was downloaded and installed 10 days
ago (in a bundle of 27 patches), so it was useless against the Lovsan worm.
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top