Worm targets vulnerability in Windows OSes

A worm exploiting a recently announced vulnerability in many Microsoft Windows operating systems has infected thousands of unprotected computers.

The vulnerability could let attackers execute code on exploited machines. The MSBlast worm apparently carries a payload that was programmed to launch a distributed denial-of-service attack against Microsoft's update site.

Microsoft announced the vulnerability and on July 16 released a patch for it. The Remote Procedure Call Distributed Component Object Model buffer overflow affects Windows NT, 2000, XP and 2003.

Systems can be protected by patching as described in Microsoft Security Bulletin MS03-026. The bulletin and the patch are available from the Microsoft Web site.

About the Author

William Jackson is a Maryland-based freelance writer.


  • business meeting (Monkey Business Images/Shutterstock.com)

    Civic tech volunteers help states with legacy systems

    As COVID-19 exposed vulnerabilities in state and local government IT systems, the newly formed U.S. Digital Response stepped in to help. Its successes offer insight into existing barriers and the future of the civic tech movement.

  • data analytics (Shutterstock.com)

    More visible data helps drive DOD decision-making

    CDOs in the Defense Department are opening up their data to take advantage of artificial intelligence and machine learning tools that help surface insights and improve decision-making.

Stay Connected