The DDOS attack against windowsupdate.com has been avoided so far due to
Microsofts decision to no longer resolve this particular hostname. Other
hosts within this domain are still accessible, so is 'windowsupdate.microsoft.com', the hostname used by Windows Update.
In the wake of this worms, at least one virus has been reported to
masquerade itself as a "Blaster Worm Fix". As always, do not execute any attachments from unknown sources.
One popup ad has been spotted which attempts to mimic the RPC error message in order to trick users into purchasing a software firewall.
Scanner False Positives
Microsoft made a scanner available which can be used by network administrators to verify remotely if machines are patched for MS03-26. We have received reports that this scanner will show Windows 98 machines as vulnerable, even though they are not.
At this point, we do recommend a followup scan with NMAP to verify the vulnerability, if no other means are available to verify if the machine is a running Windows 98.
Sample output from the scanner and nmap against a Windows 98 machines:
(taget IP replaced with 220.127.116.11)
C:\Program Files\KB823980Scan>KB823980Scan.exe 18.104.22.168
Microsoft (R) KB823980 Scanner Version 1.00.0002 for 80x86
Copyright (c) Microsoft Corporation 2003. All rights reserved.
<+> Starting scan (timeout = 5000 ms)
<-> Scan completed
Patched with KB823980 = 0
Unpatched = 1
TOTAL HOSTS SCANNED = 1
Needs Investigation = 0
Connection refused = 0
Host unreachable = 0
Errors = 0
TOTAL HOSTS SKIPPED = 0
TOTAL ADDRESSES SCANNED = 1
Starting nmap V. 3.00 ( www.insecure.org/nmap )
Host somehost.somedomain (22.214.171.124) appears to be up ... good.
Initiating SYN Stealth Scan against somehost.somedomain (126.96.36.199)
Adding open port 139/tcp
Adding open port 135/tcp
The SYN Stealth Scan took 17 seconds to scan 65535 ports.
For OSScan assuming that port 135 is open and port 1 is closed and neither
Interesting ports on somehost.somedomain (188.8.131.52):
(The 65533 ports scanned but not shown below are in state: closed)
Port State Service
135/tcp open loc-srv
139/tcp open netbios-ssn
Remote OS guesses: Turtle Beach AudioTron Firmware 3.0, Windows NT4 or
TCP Sequence Prediction: Class=trivial time dependency
Difficulty=1 (Trivial jo
TCP ISN Seq. Numbers: 19E8C4 19E933 19E9A1 19EA0F 19EA80 19EAEE
IPID Sequence Generation: Broken little-endian incremental
Nmap run completed -- 1 IP address (1 host up) scanned in 17 seconds