W32.Welchia.Worm is a worm that propagates by exploiting the Microsoft Windows DCOM RPC Interface Buffer Overrun Vulnerability (BID 8205) and the Microsoft Windows ntdll.dll Buffer Overflow Vulnerability (BID 7116).
This worm attempts to remove W32.Blaster.Worm (MCID 1761) and patch the system.
As of February 26, 2004, due to a decreased rate of submissions, Symantec Security Response has downgraded this threat to a Category 2 from a Category 3.
W32.Welchia.Worm is a worm that exploits multiple vulnerabilities, including:
- The DCOM RPC vulnerability using TCP port 135. The worm specifically targets Windows XP machines using this exploit.
- The WebDav vulnerability using TCP port 80. The worm specifically targets machines running Microsoft IIS 5.0 using this exploit. As coded in this worm, this exploit will impact Windows 2000 systems and may impact Windows NT/XP systems.
W32.Welchia.Worm does the following:
- Attempts to download the DCOM RPC patch from Microsoft's Windows Update Web site, install it, and then restart the computer
- Checks for active machines to infect by sending an ICMP echo request, or PING, which will result in increased ICMP traffic
- Attempts to remove W32.Blaster.Worm
Click for a more detailed description of Rapid Release and Daily Certified virus definitions.