sys shutdown -- remote proc call termination

R

Riffle

About 90 seconds after I open an IE window today, a
message says something like "remote procedure call
terminated unexpectedly" and then gives a 60 second count-
down to a system shutdown, by "NT Authority\System"

What is this? What can I do?
 
M

Mcploppy ©

Riffle bashed at the keyboard and said :
About 90 seconds after I open an IE window today, a
message says something like "remote procedure call
terminated unexpectedly" and then gives a 60 second count-
down to a system shutdown, by "NT Authority\System"

What is this? What can I do?

Enable your firewall and then read.

W32.Blaster.Worm
http://www.symantec.com/avcenter/venc/data/w32.blaster.worm.html

Microsoft Windows DCOM RPC Interface Buffer Overrun Vulnerability
http://www.sarc.com/avcenter/security/Content/8205.html

Install the Microsoft patch:
Buffer Overrun In RPC Interface Could Allow Code Execution (823980)
http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

--
Mcploppy ©

{ Remove both MyShoes to email me}
{ Homepage: http://tinyurl.com/bbel }
{ Local Radio: http://tinyurl.com/j1vi }
{ Download Messenger 6 http://tinyurl.com/h7co }
 
R

Ronnie Vernon MVP

Riffle said:
About 90 seconds after I open an IE window today, a
message says something like "remote procedure call
terminated unexpectedly" and then gives a 60 second count-
down to a system shutdown, by "NT Authority\System"

What is this? What can I do?

There's a new major worm currently hitting the Internet. You can get more
info about the worm here:

*Warning*
If your system has been infected by this new worm, applying the security
patch will not remove or disable the worm. This only protects your system
from from any new infection.

http://securityresponse.symantec.com/avcenter/venc/data/w32.blaster.worm.html

The following fix procedure is courtesy of Ron Martell, MVP

This is caused by a new and rapidly spreading worm.

To clear up the "NT Authority\System" and RPC call errors:

1. Go to http://support.microsoft.com/?kbid=823980 and download the
security patch. If at all possible do this on a clean machine and copy the
patch to a 3.5 inch diskette.

2. Boot the infected machine into Safe Mode (tapping the F8 key multiple
times
before and during the boot menu). Insert the 3.5 inch diskette with the
patch on it and run it. Do not reboot yet.

3. Use Start - Run - MSCONFIG and go to the Startup tab. Locate the entry
for MSBLAST.EXE and clear the checkbox for it.

4. Use Start - Search and check all your hard drives for the file
MSBLAST.EXE and delete all copies of it.

5. Shut down and restart the computer normally.

6. Immediately do an update of your antivirus software and when the updates
are installed do a complete virus scan of your hard drive.

--
Ronnie Vernon
Microsoft MVP
Windows Shell/User

Please reply to the newsgroup so all may benefit.
Unsolicited e-mail is not answered.
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top