As of February 26, 2004, due to a decreased rate of submissions, Symantec Security Response has downgraded this threat to a Category 2 from a Category 3.
W32.Welchia.Worm is a worm that exploits multiple vulnerabilities, including:
- The DCOM RPC vulnerability (first described in Microsoft Security Bulletin MS03-026) using TCP port 135. The worm specifically targets Windows XP machines using this exploit. Users are recommended to patch this vulnerability by applying Microsoft Security Bulletin MS03-039.
- The WebDav vulnerability (described in Microsoft Security Bulletin MS03-007) using TCP port 80. The worm specifically targets machines running Microsoft IIS 5.0 using this exploit. As coded in this worm, this exploit will impact Windows 2000 systems and may impact Windows NT/XP systems.
W32.Welchia.Worm does the following:
- Attempts to download the DCOM RPC patch from Microsoft's Windows Update Web site, install it, and then restart the computer
- Checks for active machines to infect by sending an ICMP echo request, or PING, which will result in increased ICMP traffic
- Attempts to remove W32.Blaster.Worm
Security Response has provided some information to aid network administrators in ongoing efforts to track down the machines that W32.Welchia.Worm has infected on their respective network. Read the document, "Detecting traffic due to RPC worms
," for additional information.
Click for a more detailed description of Rapid Release and Daily Certified virus definitions.