The W32 Blaster worm continued its spread on Tuesday, making the outbreak the most serious since the appearance of the SQL Slammer worm in January, according to security experts.

The worm, referred to alternately as W32.Blaster, the DCOM Worm or Lovsan worm, first appeared on the Internet late Monday and spread quickly, infecting machines running the Windows XP and Windows 2000 operating systems.

Blaster takes advantage of a known vulnerability in a Windows component called the DCOM (Distributed Component Object Model) interface, which handles messages sent using the RPC (Remote Procedure Call) protocol.

RPC is a common protocol that software programs use to request services from other programs running on servers in a networked environment.

Vulnerable systems can be compromised without any interaction from a user, according to Johannes Ullrich, chief technology officer at the SANS Internet Storm Center, which monitors threats to the Internet infrastructure.

The Internet Storm Center first detected the new worm around 7:00 p.m. Greenwich Mean Time and Blaster "took off" within the first hour of appearing, Ullrich said.

On Monday evening, antivirus and computer security firms around the world issued warnings about the new worm and instructed users to patch affected Windows systems and block communications ports used by the worm to spread.

By Tuesday morning, those warnings appear to have had some affect, Ullrich said.

"The worm has pretty much levelled out now. ISPs (Internet service providers) blocked port 135, which the worm used for propagation and we're seeing a limited spread," he said.

A flaw in the worm's code that governs which flavor of exploit to use when compromising a vulnerable machine may also account for the slowdowns, Ullrich said.

That flaw caused machines running Windows XP to crash and reboot, temporarily taking the host offline and tipping off the machine's owner.

Ullrich put the number of machines infected by Blaster at 30,000 worldwide, fewer than the number infected by the Code Red and NIMDA worms of 2001, but more than were infected by the recent Slammer worm.

While the worm's spread slowed Monday evening and early Tuesday, the number of infected hosts is still very large and new infections are likely as home users in Europe and the U.S. return from work and connect to the Internet from unprotected home machines on Tuesday, according to Mikko Hyppönen, manager of antivirus research at F-Secure Corp. in Helsinki.

The large base of infected machines also has experts worried about a denial of service attack that the worm is programmed to launch against Microsoft's automated Windows update Web site starting 16 August.

Traffic directed at the site,, from so many hosts could effectively shut down the service, which is used to distribute software updates and security patches to Microsoft Windows users, Hyppönen said.

Unlike the Code Red worm, which contained code for a similar attack against the IP (Internet protocol) address of the White House's main Web server, Blaster targets the domain, preventing Microsoft from simply changing the address of the domain to sidestep the attack, he said.

Microsoft is aware of the denial of service threat and is looking at ways to make more resilient, both to protect against the Blaster worm and future threats, a company spokesman said.

That said, the windowsupdate site is "extremely resilient" and has never suffered a complete denial of service, he said.

"If there's an attack on Saturday, the worst case scenario is that the site is slower than normal but not brought to its knees," he said.

Security experts will be holding their breath and waiting for the preprogrammed attacks to start, but those infected by Blaster must now cope with the daunting task of cleaning up affected systems.