MS03-026_RPC_DCOM_EXPLOIT

  Severity: LOW
  Advisory Date: NOV 16, 2012

  DESCRIPTION

This exploit code is used to take advantage of the Remote Procedure Call (RPC) Distributed Component Object Model (DCOM) vulnerability discussed in Microsoft Security Bulletin MS03-026. This code is used by a host of different malware, including the MSBLAST family of worms, which can propagate into vulnerable systems.

This detection is not a detection for the vulnerability of your machine. If you got this warning, it is an indication that a malicious piece of code passed through your network or your machine, but was detected by Trend Micro as MS03-026_RPC_DCOM_EXPLOIT.

If you have patched your system against the RPC DCOM Exploit, then your system should be safe from the damage that may be brought about by this exploit code. Otherwise, you can look up the patch information for your Windows version on this site. Trend Micro advises users to refrain from using their system until it has been completely patched against this vulnerability.

  TREND MICRO PROTECTION INFORMATION

Users of Trend Micro Internet Security and Network VirusWall can detect this exploit at the network layer with Network Virus Pattern (NVP) 10221 or later.

Download the latest NVW pattern file from the following Trend Micro webpage:

  AFFECTED SOFTWARE AND VERSION

  • Microsoft Windows NT 4.0
  • Microsoft Windows NT 4.0 Terminal Services Edition
  • Microsoft Windows 2000
  • Microsoft Windows XP
  • Microsoft Windows Server 2003

Featured Stories