Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Backdoors >> Korgo worm detection


Vulnerability Assessment Details

Korgo worm detection

Vulnerability Assessment Summary
Korgo worm detection

Detailed Explanation for this Vulnerability Assessment

The remote host is probably infected with Korgo worm.
It propagates by exploiting the LSASS vulnerability on TCP port 445
(as described in Microsoft Security Bulletin MS04-011)
and opens a backdoor on TCP ports 113 and 3067.

See also :
http://securityresponse.symantec.com/avcenter/venc/data/w32.korgo.c.html
http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx

Solution:
- Disable access to port 445 by using a firewall
- Apply Microsoft MS04-011 patch.

Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 David Maciejak

Cables, Connectors

AMD RYZEN 7 1700 8-Core 3.0 GHz (3.7 GHz Turbo) AM4 65W Desktop
$43.0
AMD RYZEN 7 1700 8-Core 3.0 GHz (3.7 GHz Turbo) AM4 65W Desktop  pictureIntel Core 2 Quad Q6600 SL9UM 2.40GHz/8M/1066MHz LGA775 CPU Processor
$14.99
Intel Core 2 Quad Q6600 SL9UM 2.40GHz/8M/1066MHz LGA775 CPU Processor pictureHP Elitebook 840 G3 Notebook, T6F45UT, 14", Core i5 3GHz, 8GB RAM, 128GB SSD
$849.99
HP Elitebook 840 G3 Notebook, T6F45UT, 14Dell Desktop Computer Intel Core i5 Windows 10 hp 64 1TB 3.40ghz 8gb Ram
$399.0
Dell Desktop Computer Intel Core i5 Windows 10 hp 64 1TB 3.40ghz 8gb Ram  picture


Discussions

No Discussions have been posted on this vulnerability.