Guest guest Posted August 15, 2003 Report Share Posted August 15, 2003 I received notice from my internet provider of a virus-worm that is planning another attack Saturday, August 16. Here is the security info from Microsoft's Security Page. I was told that if I am running Windows Millenium Edition that I did not have to worry about it. I suggest you visit the page and find out if your type of Windows operating system is vulnerable to this worm. If it is, there is a cure available, but you must download and install it prior to the worm attacking tomorrow. Once the worm attacks, it will also attack Windows Updates so that users cannot go there to fix their problem. Below this Microsoft info is the email I received from my service provider. Lynn Security information for IT professionals on this site has been updated and reorganized for easier access. Contact us with comments and suggestions. Specific Actions for Blaster Worm Check the Microsoft.com Security site for up-to-date information to help protect your systems. ON THIS PAGE: Troubleshoot and Maintain Product and Technology Security Centers Security Topics Troubleshoot and Maintain Find what you need to respond to current security issues. Hotfix and Security Bulletins Search Search for hotfixes and bulletins by product/technology, service-pack level, date, or severity. Latest Security Bulletins MS03-031 : Cumulative Patch for Microsoft SQL Server (815495) MS03-030 : Unchecked Buffer in DirectX Could Enable System Compromise (819696) MS03-029 : Flaw in Windows Function Could Allow Denial of Service (823803) Top Security Service Packs and Security Rollup Packs Easily locate the most recent service packs issued for Microsoft products. See All Security Headlines Stay informed with news about Microsoft security. Latest Security Headlines Specific Actions for Blaster Worm (August 15, 2003) Check the Microsoft.com Security site for up-to-date information to help protect your systems. Download the MS03-026 Scanning Tool (August 14, 2003) Download a tool that can be used to scan networks to identify host computers that do not have the 823980 Security Patch (MS03-026) installed to help protect them against the Blaster Worm. Virus Notice: Microsoft never distributes software directly via e-mail (July 17, 2003) From time to time, malicious individuals circulate e-mail messages that purport to be a Microsoft Security Bulletin or patch and contain or link to an executable file that contains a virus. Stay alert for clues that the e-mail messages aren't a bona fide security bulletin or patch. Security Tools and Checklists Find scanning services, analyzers, and other tools including: Microsoft Baseline Security Analyzer (MBSA), Internet Information Services (IIS) Lockdown, Software Update Services (SUS), Windows Update, Office Update "Adelphia Advanced Products Customer Care" wrote: Dear Adelphia High-Speed Internet Customer, There are two current issues that are affecting many of you today and Adelphia would like to bring them to your attention. We encourage you to take action to protect your computer. 1. MSBlast.exe Virus Information: As you may have heard, a significant virus known as MSBlast.exe (also known as the LovSan Web Worm) spread across the Internet over the past week. Unfortunately, many of you were affected. Those of you who have not taken action to protect your computer from this virus are still open to attack. According to some reports, the MSBlast.exe virus may resume its attack on Saturday August 16th, 2003. The virus is programmed to launch a distributed denial-of-service attack on windowsupdate.com. This may severely impact access to the Microsoft website used to distribute security fixes against viruses. Each computer that begins to run the worm on or after 8/16/2003 (either from new infection or after a computer restart) will engage an attack on windowsupdate.com. Customers who have already downloaded the update from Microsoft should not be affected because this is the same worm attack from August 12th - the worm is just time released in this case. If you have not downloaded the update from Microsoft, you will not be able to go to windowsupdate.com if the worm resumes its attack on 8/16/2003. To stop the virus from infecting your computer, we recommend that you take immediate action to update the security patch located at: http://www.microsoft.com/technet/security/bulletin/MS03-026.asp Customers who run firewalls are encouraged to block access to TCP port 69, 135, 4444 at the firewall level. Finally, you can go to www.adelphiapowerpage.com for links to the removal tools and security updates. Customers using Windows 2000 or Windows XP are strongly encouraged to do so no later than 12:00PM EDT August 15th, 2003. 2. NETGEAR 4-port Home Networking Router Information: Product Information: Model RP614 4-Port Cable/DSL Router with 10/100 Mbps Switch An issue has been identified with NETGEAR routers and integrated cable modem/routers. The NETGEAR equipment generates IP broadcasts to other Internet users, which causes a degraded Internet experience. The NETGEAR web site offers a solution for customers that have this product: http://www.netgear.com/support/support_details.asp?dnldID=377# Please Note: Adelphia is providing this information to help you protect yourself from the MSBlast.exe virus and to prevent any NETGEAR equipment you may own from impacting other Internet users. Adelphia is not responsible for any damage to your computer from any source used to protect against this virus. Thank you, Adelphia Communications -- dean “We are the great grassroots campaign of the modern era, made of mouse pads, shoe leather, and hope.” —Governor Dean, M.D. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You are posting as a guest. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.