Published Nov 09, 2004|Updated Apr 16, 2011

Win32/Msblast

High |Detected with Windows Defender Antivirus

Aliases: W32.Blaster.Worm (Symantec) W32/Lovsan.worm (McAfee) WORM_MSBLAST (Trend Micro) Win32.Poza (CA) Lovsan (F-secure) Worm.Win32.Blaster (Global Hauri) W32/Blaster (Norman) Blaster (Panda) W32/Blaster (Sophos)

Summary

The Win32/Msblast family of network worms exploit a Remote Procedure Call (RPC) Distributed Component Object Model (DCOM) vulnerability on Microsoft Windows 2000 and Windows XP systems. The worm may also attempt denial of service (DoS) attacks on some server sites, or create a backdoor program that allows attackers to access the infected system.

 

Latest news
VIEW ALL