WScript.KakWorm.B spreads using Microsoft Outlook Express. It attaches itself to all outgoing messages using the Signature feature of Outlook Express and Internet Explorer newsgroup reader.
The worm utilizes a known Microsoft Outlook Express security hole so that a viral file is created on the system without having to run any attachment. Simply reading the received email message will cause the virus to be placed on the system.
Microsoft has patched this security hole. The patch is available at:
If you have a patched version of Outlook Express, this worm will not work automatically.
Additional precautions that you can take:
- This document contains information about the Wscript.KakWorm.B There are differences between Wscript.KakWorm.B (note the "B") and the original version of this worm, Wscript.KakWorm. The removal procedures are different.
- One indication of this worm--though it does not occur on all systems--is the message "Driver or memory error" that appears briefly as Windows starts.
- Although this worm can be forwarded or detected in email on a Windows NT system, it infects only Windows 95/98 systems.
- While computers running either unpatched Microsoft Outlook or Outlook Express can be infected, only Outlook Express can automatically spread the infection.
Some threats, such as this one, use the VBScript computer language to run. You can protect yourself from threats that use this language by enabling Script Blocking (Norton AntiVirus 2001/2002) or by disabling or uninstalling the Windows Scripting Host. Because the Windows Scripting Host is an optional part of Windows, it can be safely removed from your computer. (Some programs, however, need Windows Scripting Host in order to function properly.)
- If you are using Norton AntiVirus 2002, which includes Script Blocking, make sure that Script Blocking is enabled (the default).
- If you are using Norton AntiVirus 2001, a free program update that includes Script Blocking is available. Please run LiveUpdate to obtain this.
- For other versions of Norton AntiVirus, SARC offers a tool to disable the Windows Scripting Host.
- To disable the Windows Scripting Host in Microsoft Outlook Express only, see the Microsoft Knowledge Base document OLEXP: How to Disable Active Scripting in Outlook Express, Article ID: Q192846.
Click for a more detailed description of Rapid Release and Daily Certified virus definitions.