Thank you for being a valued part of the CNET community. As of December 1, 2020, the forums are in read-only format. In early 2021, CNET Forums will no longer be available. We are grateful for the participation and advice you have provided to one another over the years.

Thanks,

CNET Support

General discussion

MS BLAST

Feb 23, 2004 12:13AM PST

Discussion is locked

- Collapse -
Re:MS BLAST
Feb 23, 2004 12:28AM PST

Yep, is still floating around ! The solution is to go to Microsoft's website and download a patch that was posted on July 16. Microsoft Security Bulletin MS03-026 has patches for the seven "new technology" versions of Windows affected, from the antique NT4 via Windows XP to the latest 64-bit server software. All you have to do is install the update and you're almost done. http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

The catch, of course, is that your PC may close down or reboot before you have time to do it. The solution is to go to the Start menu, select Run, type the command

shutdown -a

in the box and click OK. This aborts the shutdown process. Then you can download the patch and restart your PC.

There are some more complicated alternatives. One is to get a friend with an unaffected version of Windows, such as Windows Me, to download the patch to a floppy disk for you. Another is to disable the RPC feature by turning off its life support, as described in Microsoft Knowledge Base Article 825750.

How Computer Viruses Work: http://computer.howstuffworks.com/virus4.htm

What's a "Worm"? http://computer.howstuffworks.com/virus3.htm

- Collapse -
MS BLAST = BLAST MS
Feb 23, 2004 12:34AM PST

I'll explain it as simply as possible, but you can read more detailed explanations out on the web...

MS BLAST is what is called a WORM. The "stock" install of Windows NT, 2000, XP and 2003 left an open port to something called RPC. No need to detail what that is, but it was needed for many things. The problem is that by sending a specially corrupted message to that, the RPC program which runs as Administrator (or system!) can be instructed to fault and execute the code that was in the message.

Since this is a system service, no Antivirus can defend against it.

-> The end of the story.

As long as XP CD's exist that are unpatched, the problem will continue forever. Which is why my solution to part of the problem is a simple one.

--> Microsoft should offer a free patched OS CD to anyone that sends in their original OS CD.
--> OEMs should do the same.

Bob

- Collapse -
Re:MS BLAST = BLAST MS
Feb 23, 2004 5:37AM PST

Thanks for the explanation and the links in the previous post. I will read more about it.
So, person or persons launching these "codes" are not traceable? I would think we have the technology to root these idiots out. Weird to think that there are weirdos just sitting around trying to figure out how to cause such havoc on peoples PCs. Makes you wonder who is REALLY behind these worms.

Conspiracy?

~Tom