Handler on Duty: Jim Clausing
Threat Level: green
Thinking...
|
|
||||||||||||||||||||||
| URL |
|---|
| LSASS exploit, SSL PCT exploits, port 559 (tcp) proxy hunter, Bagle.Z |
| Spyware Tool Kit, OSPF Filtering & Authentication, Port 559 Traffic Spike |
| Submitted By | Date |
|---|---|
| Comment | |
| Pat | 2004-02-27 19:34:52 |
| Backdoor.Domwis Discovered on: February 06, 2004 Last Updated on: February 09, 2004 03:39:20 PM Backdoor.Domwis is a backdoor Trojan horse, which allows unauthorized, remote access to your computer. By default is opens TCP port 559. fwiw,Most likely the trojan listed at Symantec, http://securityresponse.symantec.com/avcenter/venc/data/backdoor.domwis.html Type: Trojan Horse Infection Length: 15,360 bytes Systems Affected: Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows XP Systems Not Affected: DOS, Linux, Macintosh, OS/2, UNIX | |
| CVE # | Description |
|---|
