Updated: July 12, 2020 (January 12, 2004)
Analyst ReportBlaster Dewormer Available
Responding to complaints from ISPs who are still detecting abnormal traffic on the Internet, Microsoft has released a tool to ensure that the Blaster worm is removed from infected PCs.
The worm, technically known as W32.Blaster.Worm, exploits the Distributed COM (DCOM) Remote Procedure Call (RPC) vulnerability on Windows XP and Windows 2000 computers, as described in Microsoft Security Bulletin MS03-039.
Installing the patch fixes the vulnerability, but does not remove the Blaster worm, so the computer may continue to generate network traffic as it attempts to locate and infect vulnerable computers.
Customers should use the Microsoft Windows Blaster Worm Removal Tool, or one of the equivalent tools that have been available for some time from antivirus companies, on all computers running Windows XP and 2000 that may have been infected by Blaster. Organizations may also want to tell employees who log on from home to use the tool on their home PCs to avoid reinfecting corporate PCs and to reduce unwanted network traffic.
Atlas Members have full access
Get access to this and thousands of other unbiased analyses, roadmaps, decision kits, infographics, reference guides, and more, all included with membership. Comprehensive access to the most in-depth and unbiased expertise for Microsoft enterprise decision-making is waiting.
Membership OptionsAlready have an account? Login Now