TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Frank Haber
from: Geo.
date: 2007-04-18 14:00:44
subject: Re: MS DNS worm on the loose

From: "Geo." 


"Frank Haber"  wrote in message
news:46264038$1{at}w3.nls.net...
> This one?  (Copied from your FD scraping group below, and THANKS again for


nope, this one

http://isc.sans.org/diary.html?storyid=2643

don't bother with the mcafee link, it's got bad info. The worm is spreading
via the MS DNS RPC exploit and also via file shares once it gets inside a
network. Not sure how the file share part is allowing it to spread but I
have confirmed that if it gets in then it will spread to other W2K machines
that are not running dns.

We have one downstream ISP who has been chasing this thing around all day.
They have about 9 infected machines now.

cure for the worm

once you clean the machine use regedit and go to
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DNS\Parameters
create a new entry: RpcProtocol (reg-dword) and set it equal to 4 then reboot.

This turns off RPC for dns, it breaks the dns manager application so that
it can't connect from one machine to another but it will keep the box from
getting re-infected again until MS comes out with a patch.

Geo. (it probably breaks active directory as well but that should not be an
issue for external exposed dns servers)

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 5030/786
@PATH: 379/45 1 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.