Skip Over Navigation Links
Center for Information TechnologyAntivirus
Antivirus Home Page
Contact Us
Questions or Comments
Disclaimers

Software
Current client downloads:
 VScan Engine/Dat (SuperDat) -4.3.20/4.0.4399
 VirusScan Enterprise 8.0i - Windows NT/2000/XP/2003
 VirusScan Enterprise 7.1 - Windows NT/2000/XP/2003
 Version 4.5.1 (install Service Pack 1) - Windows 9x/ME
 Virex (OS X) Engine/Def - 7.2(v1.1)/041013
 Virex (OS 9.x) Engine/Def - 6.2/041001
 Linux & Solaris Engine/Dat - 4.3.20/4.0.4399
 Symantec Antivirus - 9.0
 Ad-aware - 6.0
 Clean Boot 1.0
 Stinger v2.4.0 virus removal tool (Updated 9/28/04, 3:22am)
 Microsoft Patch Library
Current server downloads:
 VirusScan Enterprise 7.1
 NetShield NetWare - 4.6.2
 NetShield NetWare Engine Update - 4.3.20
 ePO agent for NetWare
 Sybari Antigen - 528/966
 TrendMicro - 6.810/200
 ScanMail eManager - 3.0
 Microsoft Patch Library

Information
 Configuration Tips
 VirusScan FAQs
 Ad-aware FAQs
 Central EMail Status
 VirusScan Instructions
 Additional Resources
 ePO 3.0/VirusScan 7.0 Presentation

Archives
 List of Viruses

Virus Archives

W32/SQLSlammer (updated 1/30/2003, 7:45 A.M.)

New tool to scan for and disable non-patched machines
sqlscanpkg can disable all vulnerable machines (machines running SQL2000 or MSDE2000, without the requisite patches). This newly released tool is is more stable, and provides more accurate results that sscheck.exe did. However, there is still a possiblity that production machines could be disabled. Read the enclosed README.TXT file carefully before using this tool. See http://microsoft.com/downloads/details.aspx?FamilyId=9552D43B-04EB-4AF9-9E24-6CDE4D933600&displaylang;=en for additional information.

W32/SQLSlammer (A.K.A. Sapphire) Description
This worm, discovered 1/24/2003, uses a SQL vulnerability to infect the host. The infection exists in memory only, so it is not detected by traditional antivirus software.
You should apply SP3 to SQL2000 servers. Otherwise, install SQL Service Patch 2, and then apply the security patch Q323875.

Platforms affected:
SQL 2000 (Developer, Standard and Enterprise)
Microsoft SQL Desktop Engine 2000 (MSDE 2000)
MSDN
Office Developer Edition (2000 and XP)
Visual Studio.NET
Visual Foxpro 7.0 and 8.0
Non-standard version of Access 2000 (See MSDE Applications for a list of 3rd party applications that use MSDE).

Although it does not infect SQL7, you should ensure that SQL7 servers are patched appropriately.

Do not assume you have MSDE just because you have Access 2000. See below for instructions.

Important information from Microsoft regarding these patches is at http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS02-061.asp

SQL Server SP3 instructions:

  • Save Service Pack 3 (SQL SP3) and the patches to any removeable media (e.g. cd or other storage device)
  • Isolate the Server by removing it from the network (unplug the network cable)
  • Reboot the server
  • Install SQL SP3
  • Reboot the server
  • Reattach the server to the network
  • From the command line, run the command (without quotes) "netstat -a -s"
  • The number of udp packets sent will be small following a successful patch

SQL Server SP2 instructions:

  • Save Service Pack 2 (SQL SP2) and the patches to any removeable media (e.g. cd or other storage device)
  • Isolate the Server by removing it from the network (unplug the network cable)
  • Reboot the server
  • Install SQL SP2
  • Reboot the server
  • Execute the patch Q323875
  • Reboot the server
  • Reattach the server to the network
  • From the command line, run the command (without quotes) "netstat -a -s"
  • The number of udp packets sent will be small following a successful patch
MSDE (server or desktop) SP2 instructions
  • Verify that you have MSDE running.
    • Go to "Start" then "Search" and search the local system for the file "sqlservr.exe". If this file is present on your system, then you have MSDE or SQL Server installed.
    • Next right click on this file and select "properties" then "product version". If the product version is between 8.00.0194 and 8.00.0533 you are running MSDE 2000 and you need to install MSDE2000 SP2 before you install Q316333
    • If the product version is between 8.00.0534 and 8.00.0636 you are running MSDE 2000 and only need to run Q316333
  • Save the MSDE2000 SP2 to any removeable media
  • Save the MSDE2000Full SP2 to any removeable media
  • Save Q316333 to any removeable media
  • Remove the machine from the network (unplug the network cable, or disable the wireless conenction)
  • Reboot the machine
  • Install the MSDE2000 SP2. This patch may fail in certain circumstances
  • If, and only if, the MSDE2000 SP2 does not install, install MSDE2000Full SP2
  • Reboot the machine
  • Install Q316333
  • Reboot the machine
  • From the command line, run the command (without quotes) "netstat -a -s"
  • The number of udp packets sent will be small following a successful patch

MSDE SP3 instructions:

  • Save MSDE2000 Service Pack 3 (MSDE SP3) and the patches to any removeable media (e.g. cd or other storage device)
  • Isolate the Server by removing it from the network (unplug the network cable)
  • Reboot the server
  • Install MSDE SP3
  • Reboot the server
  • Reattach the server to the network
  • From the command line, run the command (without quotes) "netstat -a -s"
  • The number of udp packets sent will be small following a successful patch

See http://support.microsoft.com/default.aspx?scid=kb;en-us;315721 for more information.

To detect the presence of the worm, issue the command "netstat -a -s". A small amount of UDP traffic is normal and is to be expected. If there are a large number of connections open then the machine is likely compromised.

A good analysis is at http://isc.incidents.org/analysis.html?id=180, from the Internet Storm Center

Additional information is at:
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/ms02-039.asp from Microsoft
http://www.sarc.com/avcenter/venc/data/w32.sqlexp.worm.html from Symantec
http://vil.nai.com/vil/content/v_99992.htm from Network Associates

This archive is not intended to be comprehensive. For a more complete virus library, please visit NAI's Virus Information Library at http://vil.nai.com.

Contact TASC for assistance or call
301.59.Go.CIT (V) 301.496.8294 (TDD)

National Institutes of HealthCenter for Information Technology
National Institutes of Health
Bethesda, Maryland 20892

Questions or Comments | Disclaimers

Department of Health and Human ServicesHealth and Human Services
Washington, D.C. 20201
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -