W32.Spybot.DAZ - uses 7 MS security exploits
This one is bad news on unpatched systems and tries every imaginable way possible to infect unprotected systems W32.Spybot.DAZ - uses 7 MS security exploits http://www.symantec.com/avcenter/venc/data/w32.spybot.daz.html
W32.Spybot.DAZ is a worm that spreads through IRC, network shares, exploits, and computers that are infected with common backdoor Trojan horses. Connects to a remote IRC server on TCP port 6667 and listens for commands, including any of following:
* Download and execute files.
* Scan the network for server with running backdoor trojan horses.
* List, stop, and start processes.
* Launch Denial of Service (DoS) attacks.
Steal system information and send it to the attacker.
* Log keystrokes to a file in the %System% folder.
* Open a backdoor port.
* Control the file system (Delete, create, and list files).
* Perform port redirection.
* Flush DNS server. May spread by exploiting the following vulnerabilities:
* The DCOM RPC Vulnerability (described in Microsoft Security Bulletin MS03-026) using TCP port 135.
* The Microsoft Windows Local Security Authority Service Remote Buffer Overflow (described in Microsoft Security Bulletin MS04-011).
* The vulnerabilities in the Microsoft SQL Server 2000 or MSDE 2000 audit (described in Microsoft Security Bulletin MS02-061) using UDP port 1434.
* The WebDav Vulnerability (described in Microsoft Security Bulletin MS03-007) using TCP port 80.
* The UPnP NOTIFY Buffer Overflow Vulnerability (described in Microsoft Security Bulletin MS01-059).
* The Workstation Service Buffer Overrun Vulnerability (described in Microsoft Security Bulletin MS03-049) using TCP port 445. Windows XP users are protected against this vulnerability if the patch in Microsoft Security Bulletin MS03-043 has been applied. Windows 2000 users must apply the patch in Microsoft Security Bulletin MS03-04