Appearing in the summer of 2003, LovSan (also known as W32/Lovsan.worm, W32/Lovsan.worm.b, W32.Blaster.Worm, W32/Blaster-B, WORM_MSBLAST.A, MSBLASTER, Win32.Poza, Win32.Posa.Worm, and Win32.Poza.B) is the first virus to exploit the security hole in the RPC/DCOM feature (Remote Procedure Call) in Microsoft Windows which allows remote processes to communicate. By exploiting the hole with a buffer overflow, malware (like the LovSan virus) may take control of a vulnerable machine. Windows NT 4.0, 2000, XP and Windows Server 2003 are all affected.
When a vulnerable machine is found, the worm opens a remote shell on TCP port 4444, and makes the remote computer download a copy of the worm into the directory %WinDir%\system32 by running aTFTP command from the infected machine (UDP port 69) to start the file transfer.
Once the file is downloaded, it is run, and then creates entries in the registry so that it will automatically run again every time the computer restarts:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ Run "windows auto update" = msblast.exe I just want to say LOVE YOU SAN!! bill
|What's more, the LovSan/Blaster virus attacks the Microsoft Windows Update service in order to disrupt the updating of vulnerable machines.|
Exploiting the RPC vulnerability causes several malfunctions on affected systems related to deactivating RPC (the process svchost.exe / rpcss.exe). Vulnerable systems have the following symptoms:
Windows must now restart because the Remote Procedure Call (RPC) service terminated unexpectedly
The system is shutting down in 60 seconds. Please save all work in progress and log off. This shutdown was initiated by NT AUTHORITY\SYSTEM. Windows must now restart
To eradicate the LoveSan virus, the best method is to first disinfect the system using the following virus removal tool:
Download the virus removal tool
| If your system is rebooting constantly, you must disable automatic restart:
You should then update the system, either by using Windows Update or by downloading and installing whichever patch is right for your operating system:
What's more, since the virus spreads using Microsoft Windows networking, it is strongly recommended to install a personal firewall on your machines which are connected to the Internet, and also to filter ports TCP/69, TCP/135 to TCP/139 and TCP/4444.