|
All
Users : Use the specified DAT
files for detection and removal.
Alternatively, the following EXTRA.DAT packages are
available. EXTRA.DAT
SUPER
EXTRA.DAT
Infected systems should install the Microsoft update
to be protected from the exploit used by this worm.
See: http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx
Additional Windows ME/XP removal
considerations
Stinger Stinger has been updated to
assist in detecting and repairing this threat.
Manual Removal Instructions
To remove this virus "by hand", follow
these steps:
- Reboot the system into Safe Mode (hit the
F8 key as soon as the Starting Windows text is
displayed, choose Safe Mode.
- Delete the file AVSERVE.EXE
from your WINDOWS directory (typically
c:\windows or c:\winnt)
- Edit the registry
- Delete the "avserve" value from
- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Run
- Reboot the system into Default Mode
Sniffer Customers Filters
have been developed that will look
for Sasser traffic [Sniffer Distributed
4.1/4.2/4.3, Sniffer Portable 4.7/4.7.5, and
Netasyst].
McAfee Intrushield This
worm is detected in all Intrushield signauture sets
1.5.37.5, 1.8.27.2, 1.9.8.2 and later. In the
IntruShield Alert Viewer, you would see the following
alert when Sasser worm propagation is detected:
- DCERPC: Microsoft Windows LSASS Buffer Overflow
(0x47601c00)
Customers with in-line deployment should configure
the sensor response of the above signature action to
block in the policies.
McAfee System Compliance
Profiler Create a rule to
match a registry key
- Select HKEY_LOCAL_MACHINE from the drop-down
box
- In the field after the drop-down box, enter
in the path
Software\Microsoft\Windows\CurrentVersion\Run
- For Value name, enter avserve.exe
- In the next drop-down box, select "Registry
value does not exist"
McAfee Desktop
Firewall To prevent
possibly remote access McAfee Desktop Firewall users can
block incoming TCP port(s) 5554, 9996
McAfee
Threatscan ThreatScan
signatures that can detect the W32/Sasser.worm.a
virus are available from:
ThreatScan Signature version: 2004-05-03
ThreatScan users can detect the virus by
running a ThreatScan task using the following
settings:
- Select the "Remote Infection Detection"
category and "Windows Virus Checks" template.
-or-
- Select the "Other" category and "Scan All
Vulnerabilities" template.
For additional information:
- Run the "ThreatScan Template Report"
- Look for module number #4073
ThreatScan users can detect the remote access
component by running a Resource Discovery Task using the
following settings:
- Select TCP Port scan
- Enter ports 5554,9996
|