I think everybody is already aware of the new worm which is propagating acroos the Internet. However, thought I'd post a useful summary.

The worm exploits a vulnerability in Windows DCOM RPC subsystem. For patches, look at this [URL=http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS0*-026.asp]MS Security Bulletin[/URL]

Symantec is posting the ongoing results of their analysis of the worm [URL=https://tms.symantec.com/members/AnalystReports/0*08**-Alert-DCOMworm.pdf]here[/URL]

The ISS X-Force info on the worm is at: [URL=http://xforce.iss.net/xforce/alerts/id/*50]http://xforce.iss.net/xforce/alerts/id/*50[/URL]

The ISS X-Force info on the vuln is at: [URL=http://xforce.iss.net/xforce/alerts/id/*47]http://xforce.iss.net/xforce/alerts/id/*47 [/URL]

Modified MSSecure.XML file to use with HFNetchk/MBSA to detect Windows 2000 SP2 installations without the patch: [URL=http://www.ntbugtraq.com/LovSAN-W2KSP2.asp]LovSAN-W2KSP2.asp[/URL]

Symantec Removal Tool: [url]http://securityresponse.symantec.com/avcenter/venc/data/w*2.blaster.worm.removal.tool.html[/url]

Trend Micro Removal Tool: [url]http://www.trendmicro.com/download/tsc.asp[/url]

F-Secure Removal Tool: [url]http://www.f-secure.com/v-descs/msblast.shtml[/url]

Computer Associates Removal Tool: [url]http://www*.ca.com/virusinfo/virus.aspx?ID=*6265[/url]

McAfee/NAI Removal Tool: [url]http://vil.nai.com/vil/stinger/[/url]