Skip Over Navigation Links
Center for Information TechnologyAntivirus
Antivirus Home Page
Contact Us
Questions or Comments
Disclaimers

Software
Current client downloads:
 VScan Engine/Dat (SuperDat) -4.3.20/4.0.4399
 VirusScan Enterprise 8.0i - Windows NT/2000/XP/2003
 VirusScan Enterprise 7.1 - Windows NT/2000/XP/2003
 Version 4.5.1 (install Service Pack 1) - Windows 9x/ME
 Virex (OS X) Engine/Def - 7.2(v1.1)/041013
 Virex (OS 9.x) Engine/Def - 6.2/041001
 Linux & Solaris Engine/Dat - 4.3.20/4.0.4399
 Symantec Antivirus - 9.0
 Ad-aware - 6.0
 Clean Boot 1.0
 Stinger v2.4.0 virus removal tool (Updated 9/28/04, 3:22am)
 Microsoft Patch Library
Current server downloads:
 VirusScan Enterprise 7.1
 NetShield NetWare - 4.6.2
 NetShield NetWare Engine Update - 4.3.20
 ePO agent for NetWare
 Sybari Antigen - 528/966
 TrendMicro - 6.810/200
 ScanMail eManager - 3.0
 Microsoft Patch Library

Information
 Configuration Tips
 VirusScan FAQs
 Ad-aware FAQs
 Central EMail Status
 VirusScan Instructions
 Additional Resources
 ePO 3.0/VirusScan 7.0 Presentation

Archives
 List of Viruses

Virus Alerts

 W32/Bagle.ah@mm Last Updated 7/19/04 7:00PM
  CIT has been notified of a new email virus called W32/Bagle.ah@mm. This is a mass-mailing worm that harvests email addresses from infected machines. Emails are forged to appear to be sent by an address collected from the infected machine.MORE INFORMATION
What's New
 Microsoft Security Bulletin MS04-028 (important) Update 09/28/04 4:00pm < --
Microsoft has released Microsoft Security Bulletin MS04-028 regarding a vulnerability in Microsoft's GDI+ component responsible for JPEG Processing. This vulnerability could allow an attacker to take control of an affected system. When exploited the attacker gains the privileges of the logged in user.

More information Patches are available here

 Microsoft Security Bulletin MS04-027 (important) Update 09/28/04 4:00pm < --
Microsoft has released Microsoft Security Bulletin MS04-027 regarding a vulnerability in Microsoft's WordPerfect 5.x Converter.This vulnerability could allow an attacker to take control of an affected system. When exploited the attacker gains the privileges of the logged in user.

More information Patches are available here

 VirusScan Enterprise 8.0i and ePO 3.5 Update 08/31/04 10:20am < --
CIT is currently evaluating Enterprise 8.0i and ePO 3.5 and is not supporting them. CIT will support these products in the near future and will make installation and configuration recommendations available at that time.

The following software is available for download on the NIH Antivirus site under Current client and Current server downloads:

  • McAfee VirusScan Enterprise 8.0i - VirusScan Enterprise 8.0i is McAfee's latest virus scanning software for Windows PCs and Servers. This version includes firewall like capabilities as well as detection and removal of unwanted programs such as adware. See the product guide included with the software download for more information.

  • McAfee ePO 3.5 - McAfee ePO 3.5 is the latest version of McAfee's antivirus software management tool. This new version includes the ability to detect rogue or previously unknown machines on the network that the ePO server is managing. See the product guide included with the software download for more information.

  • McAfee Common Management Agent 3.5 - McAfee Common Management Agent is a new software component for ePO 3.0.x that is required for managing VS 8.0i.

Note: Consult with your ISSO for your IC's policy regarding antivirus software before installing VirusScan Enterprise 8.0i.

 Microsoft XP Service Pack 2 Update 08/13/04 5:30pm < --
Microsoft has released Service Pack 2. Included in this service pack are several new security features such as a desktop firewall that can filter both inbound and out bound communications and a built-in pop-up blocker for Internet Explorer.

Note: Due to major configuration changes and the various policies throughout the NIH environment, please check with the NIH Helpdesk to see if your IC supports this service pack. Please call the NIH Helpdesk and you will be referred to your local support.

For more information see http://support.microsoft.com/default.aspx?pr=windowsxpsp2 from Microsoft.

 Microsoft Security Bulletin MS04-025 (important) Update 07/30/04 7:00pm < --
Microsoft has released Microsoft Security Bulletin MS04-025 regarding vulnerabilities in the Microsoft Internet Explorer Browser that could allow an attacker to run malicious code on a vulnerable system. The patch addresses across site scripting vulnerability which could allow code to be run in the local security zone instead of Internet Explorer. The patch also addresses vulnerabilities regarding the handling of corrupt bitmap and GIF files in Internet Explorer. These vulnerabilities could allow malicious code to be run in the security context of the account that is currently logged into the vulnerable machine.

These vulnerabilities affect Internet Explorer 5.01, Internet Explorer 5.5, and Internet Explorer 6. Patches are available here

 Microsoft Patch Library for Windows XP and 2000. Update 04/27/04 3:00pm< --
This patch library contains Microsoft critical security patches and current service packs for Windows XP and 2000 Professional. The patch library will be updated after Microsoft releases new updates which is typically the second Tuesday of each month. It is recommended that the most recent service pack be installed to keep Microsoft windows XP and 2000 operating systems updated. These files are available for download here.

 
If you receive a suspicious email you can have the email checked out by forwarding it to NIHAV@mail.nih.gov. CIT will check your message for known viruses and notify you of the results.

Do not execute unexpected attachments.

Contact TASC for assistance or call
301.59.Go.CIT (V) 301.496.8294 (TDD)

National Institutes of HealthCenter for Information Technology
National Institutes of Health
Bethesda, Maryland 20892

Questions or Comments | Disclaimers

Department of Health and Human ServicesHealth and Human Services
Washington, D.C. 20201
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -