This new variant is a repacked version of its predecessor. MS04-011 Security Bulletin - the key Prevention patch needed: Exploit code is then sent to the host to overflow a buffer in LSASS.EXE and execute the virus on the victim system. The worm scans IP addresses in the class A or class B subnets as well as random IP addresses, sending SYN packets on TCP port 445 to identify potential victims. Korgo Overview: This worm exploits vulnerable Microsoft Windows systems. The MS04-011 security patch is needed as the virus family continues to grow with new functional or repackaged variants. Development continues as more variants are being added to the growing Korgo worm family.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |