1. Symantec/
  2. Security Response/
  3. W32.Blaster.B.Worm


Risk Level 2: Low

August 13, 2003
February 13, 2007 12:05:46 PM
Also Known As:
WORM_MSBLAST.B [Trend], Win32.Poza.C [CA], W32/Lovsan.worm.c [McAfee], Worm.Win32.Lovesan [Kaspesky], W32/Blaster-A [Sophos]
Systems Affected:
CVE References:

W32.Blaster.B.Worm is a variant of W32.Blaster.Worm that exploits the DCOM RPC vulnerability (described in Microsoft Security Bulletin MS03-026), using TCP port 135. The worm targets only Windows 2000 and Windows XP machines. While Windows NT and Windows 2003 Server machines are vulnerable to the aforementioned exploit if it is not properly patched, the worm is not coded to replicate to those systems.

This worm attempts to download the penis32.exe file to the %WinDir%\System32 folder, and then execute it. This worm does not have any mass-mailing functionality.

Antivirus Protection Dates

  • Initial Rapid Release version August 13, 2003
  • Latest Rapid Release version September 28, 2010 revision 054
  • Initial Daily Certified version August 13, 2003
  • Latest Daily Certified version September 28, 2010 revision 036
  • Initial Weekly Certified release date August 13, 2003
Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.
Writeup By: Fergal Ladley

Search Threats

Search by name
Example: W32.Beagle.AG@mm
STAR Antimalware Protection Technologies
2016 Internet Security Threat Report, Volume 21
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube