Richard Campbell wrote:

> Hi..  My friends told me other than the microsoft patches can prevent 
> Blaster virus , a firewall and  blocking switch ports can block the virus 
> too.  Is there any configuration need to be added in my PIX and Cisco
switch
> ports in order to block them? If yes, is there any example??  But I don't 
> understand the concept, can you explain to me the concept? How can a 
> firewall and switch port block Virus???   For example, my PIX disallow
every
> incoming traffic except the ping reply, doesn't it mean it block the virus 
> too??
> 
> _________________________________________________________________
> MSN 8 with e-mail virus protection service: 2 months FREE* 
> http://join.msn.com/?page=features/virus
> **Please support GroupStudy by purchasing from the GroupStudy Store:
> http://shop.groupstudy.com
> FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
> 
The MSBlaster Worm propagates without email -- it scans for a 
host with open ports, enters through those ports, executes its 
package which takes advantage of RPC and/or DCOM vulnerabilities, 
then propagates.

That's a very short version, more info is available at 
www.cert.org, www.sans.org, isc.sans.org.

TCP Ports used are 135, 137-139, 445, and (I believe, no time to 
look it up now) 1026. TFTP downloads (which is part of the worm's 
internal execution) occur on 4444 (UDP), IIRC.

Try the above references for better info.

Annlee




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=74101&t=74101
--------------------------------------------------
**Please support GroupStudy by purchasing from the GroupStudy Store:
http://shop.groupstudy.com
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html

Reply via email to