+++ Cypress Solutions [28/08/03 21:47 -0700]:
> * Attempts to download the DCOM RPC patch from
> Microsoft's Windows Update Web site, install it, and
> then reboot the computer. 
> * Checks for active machines to infect by sending an
> ICMP echo request, or PING, which will result in
> increased ICMP traffic. 
> * Attempts to remove W32.Blaster.Worm.

Sorry. I read this reply only now. Thanks for the information.
But I wonder if there is a different way to solve this problem. Fromt he
description of the virus, it only attacks the class B address of the network
that it is in. 

So it is possible that the router for the cable network:
1. Doesn't itself respond to pings.
2. Lets through ICMP pings to IP addresses outside its class B & C 
   addresses?

I have seen a copy of this virus in action in the LAN and I have seen the
havoc it causes. However, putting blanket bans on ICMP makes life real
difficult.

Also, I have no clue why traceroute is not working either? I thought
traceroute only uses UDP probes to a very high (generally unused port) by
default. How has it been affected by these?

- Sandip

-- 
Sandip Bhattacharya                        http://www.sandipb.net
sandip at puroga.com
Puroga Technologies Pvt. Ltd. 
http://www.puroga.com

_______________________________________________
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd

Reply via email to