Remove the Blaster Worm [MSBlast, Blaster, etc.]
- Editing the RPC to allow you to connect to the internet
- Start > Run
- Type: "services.msc /s" in the open line and click OK
- On the right hand side find the Remote Procedure Call service [there is a Remote Procedure Call Locator service, do not confuse the two]
- Right-click the Remote Procedure Call (RPC) service, and then click Properties.
- Click the Recovery tab.
- Using the drop-down lists, change First failure, Second failure, and Subsequent failures to "Restart the Service."
- Click Apply, and then click OK.
Note: Make sure you change these back after removing the virus.
- For Windows XP
- If your computer reboots repeatedly, please unplug your network cable from the wall.
- First, enable Internet Connection Firewall (ICF) in Windows XP: http://go.microsoft.com/?linkid=220772
- In Control Panel, double-click "Networking and Internet Connections", and then click "Network Connections".
- Right-click the connection on which you would like to enable ICF, and then click "Properties".
- On the Advanced tab, click the box to select the option to "Protect my computer or network".
- Plug the network cable back into the wall to reconnect your computer to the Internet
- Download the MS03-026 security patch from Microsoft and install it on your computer:
- Install or update your antivirus signature software and scan your computer
- Download and run the worm removal tool from your antivirus vendor.
Windows XP (32 bit)
http://go.microsoft.com/?linkid=220773Windows XP (64 bit)
http://go.microsoft.com/?linkid=220774 - For Windows 2000 systems, where Internet Connection Firewall (ICF) is not available, the following steps will help block the affected ports so that the system can be patched. These steps are based on a modified excerpt from the article; HOW TO: Configure TCP/IP Filtering in Windows 2000. http://go.microsoft.com/?linkid=220775
- Configure TCP/IP security on Windows 2000:
- Select "Network and Dial-up Connections" in Control Panel.
- Right-click the interface you use to access the Internet, and then click "Properties".
- In the "Components checked are used by this connection" box, click "Internet Protocol (TCP/IP)", and then click "Properties".
- In the Internet Protocol (TCP/IP) Properties dialog box, click "Advanced".
- Click the "Options" tab.
- Click "TCP/IP filtering", and then click "Properties".
- Select the "Enable TCP/IP Filtering (All adapters)" check box.
- There are three columns with the following labels:
- TCP Ports
- UDP Ports
- IP Protocols
- In each column, you must select the "Permit Only" option.
- Click OK.
- Download the MS03-026 security patch for Windows 2000 from Microsoft and install it on your computer from: http://go.microsoft.com/?linkid=220776
- Install or update your antivirus signature software and scan your computer
- Then, download and run the worm removal tool from your antivirus vendor.
- Configure TCP/IP security on Windows 2000:
- Prevention:
- Turn on Internet Connection Firewall (Windows XP or Windows Server 2003) or use a third-party firewall to block TCP ports 135, 139, 445 and 593; UDP port 135, 137,138; also UDP 69 (TFTP)and TCP 4444 for remote command shell. To enable the Internet Connection Firewall in Windows: http://go.microsoft.com/?linkid=220782
- In Control Panel, double-click "Networking and Internet Connections", and then click "Network Connections".
- Right-click the connection on which you would like to enable ICF, and then click "Properties".
- On the Advanced tab, click the box to select the option to "Protect my computer or network".
This worm utilizes a previously announced vulnerability as part of its infection method. Because of this, customers must ensure that their computers are patched for the vulnerability that is identified in Microsoft Security Bulletin MS03-026. http://go.microsoft.com/?linkid=220783.
- Install the patch MS03-026 from the Microsoft Download Center:
Windows NT 4 Server & Workstation
http://go.microsoft.com/?linkid=220784Windows NT 4 Terminal Server Edition
http://go.microsoft.com/?linkid=220785Windows 2000
http://go.microsoft.com/?linkid=220786Windows XP (32 bit)
http://go.microsoft.com/?linkid=220787Windows XP (64 bit)
http://go.microsoft.com/?linkid=220788Windows 2003 (32 bit)
http://go.microsoft.com/?linkid=220789Windows 2003 (64 bit)
http://go.microsoft.com/?linkid=220790 -
As always, please make sure to use the latest antivirus detection from your antivirus vendor to detect new viruses and their variants.
Related Knowledge Base Articles:
http://go.microsoft.com/?linkid=220791Related Microsoft Security Bulletins:
http://go.microsoft.com/?linkid=220792
- Turn on Internet Connection Firewall (Windows XP or Windows Server 2003) or use a third-party firewall to block TCP ports 135, 139, 445 and 593; UDP port 135, 137,138; also UDP 69 (TFTP)and TCP 4444 for remote command shell. To enable the Internet Connection Firewall in Windows: http://go.microsoft.com/?linkid=220782
Leave a Reply