Penn Computing
Computing Menu Computing A-Z
Computing Home Information Systems & Computing Penn

W32.Blaster.Worm Reported on Campus

August 12, 2003 :: David Millar, ISC Information Security Officer

Information Systems & Computing (ISC) has recently received numerous reports on campus of a new worm known as “W32.Blaster.Worm”, which has also been dubbed "LovSan" in the press. W32.Blaster.Worm affects machines running Windows NT, 2000, XP, or Server 2003, exploiting the recently discovered DCOM RPC (buffer overflow) vulnerability. This security vulnerability could allow an attacker to compromise a computer and gain control over it.

W32.Blaster.Worm is not spread through email, but through a scanning algorithm that targets any unprotected machine with a network connection. In addition to giving full system access to unauthorized users, its known effects include involuntary system reboots and attempts at generating a denial-of-service attack on windowsupdate.com beginning on August 16, 2003.

Users are urged to contact their Local Support Providers (LSPs) or Information Technology Advisors (ITAs) to determine how best to protect or disinfect their particular computer systems. Users should also observe best practices in personal computing security and data protection to minimize their vulnerability to such attacks in the future.

Additional details about W32.Blaster.Worm/LovSan can be found at the W32.Blaster.Worm page, including measures for prevention and recovery.



News & Announcements
Computing Newsroom
ISC News - Recent news from ISC
ISC Events - ISC facilitates and supports IT events around campus
Keep up to date with ISC's Cloud First program
top

Information Systems and Computing
University of Pennsylvania
Comments & Questions


University of Pennsylvania Penn Computing University of Pennsylvania Information Systems & Computing (ISC)
Information Systems and Computing, University of Pennsylvania