VIRUS NOTICE Microsoft RPC Exploit & W32.Blaster.Worm Summary: There is a new and very serious security vulnerability with Microsoft Windows versions NT4, 2000, 2003 Server, and XP. It is critical that you apply the patch. W3. 2. Blaster. Worm Removal Tool . This is described in Microsoft Security Bulletin MS0. You must download and install the patch. In many cases, you will need to do this before continuing with the removal instructions. If you are not able to remove the infection or prevent re- infection using the following instructions, first download and install the patch. Additional information, and an alternate site from which to download the Microsoft patch is available in the Microsoft article . It has been reported that, for users of Windows XP, activating the Windows XP firewall may allow you to download and install the patch, obtain virus definitions, and run the removal tool. Infected with a virus? Unsure whether your existing antivirus software has detected and removed it? Still having problems and unsure where to turn to next? Sophos Virus Removal Tool can help.This may also work with other firewalls, although this has not been confirmed. Important: If you are on a network or have a full- time connection to the Internet, such as a DSL or cable modem, disconnect the computer from the network and Internet. Disable or password- protect file sharing, or set the shared files to Read Only, before reconnecting the computers to the network or to the Internet. Because this worm spreads by using shared folders on networked computers, to ensure that the worm does not reinfect the computer after it has been removed, Symantec suggests sharing with Read Only access or by using password protection. For instructions on how to do this, refer to your Windows documentation, or the document: How to configure shared Windows folders for maximum network protection. If you are removing an infection from a network, first make sure that all the shares are disabled or set to Read Only. This tool is not designed to run on Novell Net. Ware servers. To remove this threat from a Net. Ware server, first make sure that you have the current virus definitions, and then run a full system scan with the Symantec antivirus product. How to download and run the tool. Important: You must have administrative rights to run this tool on Windows NT 4. Windows 2. 00. 0, or Windows XP. Note for network administrators: If you are running MS Exchange 2. Server, we recommend that you exclude the M drive from the scan by running the tool from a command line, with the Exclude switch. For more information, read the Microsoft knowledge base article: XADM: Do Not Back Up or Scan Exchange 2. Drive M (Article 2. Follow these steps to download and run the tool: Download the Fix.
Blast. exe file from: http: //www. If you are not sure, or are a network administrator and need to authenticate the files before deployment, follow the steps in the . For instructions on how to turn off System Restore, read your Windows documentation, or one of the following articles: How to disable or enable Windows Me System Restore. How to turn off or turn on Windows XP System Restore. Locate the file that you just downloaded. Double- click the Fix. Blast. exe file to start the removal tool. Click Start to begin the process, and then allow the tool to run. NOTE: If you have any problems when you run the tool, or it does nor appear to remove the threat, restart the computer in Safe mode and run the tool again. Restart the computer. Run the removal tool again to ensure that the system is clean. If you are running Windows Me/XP, then reenable System Restore. If you are on a network or if you have a full- time connection to the Internet, reconnect the computer to the network or to the Internet connection. Run Live. Update to make sure that you are using the most current virus definitions. When the tool has finished running, you will see a message indicating whether the threat has infected the computer. The tool displays results similar to the following: Total number of the scanned files. Number of deleted files. Number of repaired files. Number of terminated viral processes. Number of fixed registry entries. What the tool does. The Removal Tool does the following: Terminates the associated processes. Deletes the associated files. Deletes the registry values added by the threat. Switches. The following switches are designed for use by network administrators: /HELP, /H, /? Displays the help message./NOFIXREG Disables the registry repair (We do not recommend using this switch)./SILENT, /S Enables the silent mode./LOG=. By default, this switch creates the log file, Fix. Blast. log, in the same folder from which the removal tool was executed./MAPPED Scans the mapped network drives. See the following Note.)/START Forces the tool to immediately start scanning./EXCLUDE=. See the following Note.)/NOCANCEL Disables the cancel feature of the removal tool./NOFILESCAN Prevents the scanning of the file system./NOVULNCHECK Disables checking for unpatched files. Important: Using the /MAPPED switch does not ensure the complete removal of the virus on the remote computer, because: The scanning of mapped drives scans only the mapped folders. This may not include all the folders on the remote computer, which can lead to missed detections. If a viral file is detected on the mapped drive, the removal will fail if a program on the remote computer uses this file. Therefore, you should run the tool on every computer. The /EXCLUDE switch will only work with one path, not multiple. An alternative is the /NOFILESCAN switch followed by a manual scan with Anti. Virus. This will let the tool alter the registry. Then, scan the computer with Anti. Virus with current virus definitions. With these steps, you should be able to clean the file system. The following is an example command line that can be used to exclude a single drive. Then, run a regular scan of the system with proper exclusions. Symantec recommends that you use only copies of the removal tool that have been directly downloaded from the Symantec Security Response Web site. If you are not sure, or are a network administrator and need to authenticate files before deployment, you should check the authenticity of the digital signature. Follow these steps: Go to http: //www. Download and save the Chktrust. Note: Most of the following steps are done at a command prompt. If you downloaded the removal tool to the Windows desktop, it will be easier if you first move the tool to the root of the C drive. Then save the Chktrust. C as well.(Step 3 to assume that both the removal tool and Chktrust. C drive.)Click Start > Run. Type one of the following: Windows 9. Me: command. Windows NT/2. XP: cmd. Click OK. In the command window, type the following, pressing Enter after typing each line: cd\cd downloadschktrust - i Fix. Blast. exe. You should see the following message: Do you want to install and run . They will be adjusted your computer's time zone and Regional Options settings. If you are using Daylight Saving time, the displayed time will be exactly one hour earlier. If this dialog box does not appear, there are two possible reasons: The tool is not from Symantec: Unless you are sure that the tool is legitimate and that you downloaded it from the legitimate Symantec Web site, you should not run it. The tool is from Symantec and is legitimate: However, your operating system was previously instructed to always trust content from Symantec. For information on this and on how to view the confirmation dialog again, read the document: How to restore the Publisher Authenticity confirmation dialog box. Click Yes or Run to close the dialog box. Type exit, and then press Enter.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2016
Categories |