Just got this email:
We are writing to inform all of our customers running Microsoft Windows 2000 or XP operating systems of a recent viral threat to the Internet. If you do not have any computers running either of these operating systems, you may disregard this alert.
The most recent virus threat to the Internet, "W32.Blaster.Worm", also known as, W32/Lovsan.worm [McAfee], Win32.Poza [CA], Lovsan[F-Secure], WORM_MSBLAST.A [Trend], W32/Blaster-A [Sophos], W32/Blaster [Panda] has been upgraded by Symantec to a Category 4 (of 5) threat.
This worm exploits the DCOM RPC vulnerability using TCP port 135. It then attempts to download and run the Msblast.exe file.
Although the main activity of this worm is set to trigger on 8/16/03, the worm's impact is already being felt as the traffic generated by the propagation decreases the overall throughput of everyone accessing the Internet.
Due to the widespread propagation of this worm and serious nature of the threat, we are alerting all of our customers and request that you take immediate steps to ensure all of your machines are secured against this worm.
For further detail regarding this worm, please visit:
Symantec:
http://securityresponse.symantec.com/avcenter/venc/data/w32.blaster.worm.html
McAffee:
http://us.mcafee.com/virusInfo/default.asp?id=lovsan
To remove this worm from your system, please visit:
http://securityresponse.symantec.com/avcenter/venc/data/w32.blaster.worm.removal.tool.html
Once you have removed the worm from your system, please download the patch detailed in Microsoft Security Bulletin MS03-026:
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-026.asp
This bulletin's FAQ details other options for securing your machine against this threat.
Additionally, we ask that you run a full 'Microsoft Update' to ensure your machine is fully protected from this worm and any other security concerns. It will be necessary to reboot all machines that are patched and updated, otherwise the updates will not take affect.
A final, advanced, step to fully secure your network is to close port 135/tcp (and, if possible, 135-139, 445 and 593), and monitor TCP Port 444 and UDP Port 69 (tftp), which are also utilized by this worm.