The DCOM RPC Vulnerability (described in Microsoft Security Bulletin MS03-026) using TCP port 135. Newer variants may also spread by exploiting the following vulnerabilities: can perform various actions by connecting to a configurable IRC server and joining a specific channel to listen for instructions. This worm can also spread to computers that are compromised by common back door Trojan horses and on network shares protected by weak passwords. is a detection for a family of worms that spreads using the Kazaa file-sharing network and mIRC.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |