Skip Over Navigation Links
Center for Information TechnologyAntivirus
Antivirus Home Page
Contact Us
Questions or Comments
Disclaimers

Software
Current client downloads:
 VScan Engine/Dat (SuperDat) -5300/2777.5511
 VirusScan Enterprise 8.5i (with Patch 6) - Windows NT/2000/XP/2003
 VirusScan Enterprise 7.1 - Windows NT/2000/XP/2003
 Virex (OS X) Engine/Def - 7.2(v1.1)/081029
 Virex (OS 9.x) Engine/Def - 6.2/071001
 Linux & Solaris Engine/Dat - 5.2.00/4.0.5196
 Symantec Antivirus - 10.1.7.7000
 Symantec Antivirus - 10.2
 Clean Boot 1.0
 Stinger v3.8.0 virus removal tool (Updated 09/10/07)
Current server downloads:
 VirusScan Enterprise 8.5
 VirusScan Enterprise 7.1
 NetShield NetWare - 4.6.2
 NetShield NetWare - 4.6.3
 NetShield NetWare Engine Update - 4.4.00
 ePO agent for NetWare
 ScanMail eManager - 3.0

Information
 ePO 3.0/VirusScan 7.0 Presentation
 Virex 7.x Installation Instructions
 VirusScan FAQs
 VirusScan Instructions
 Additional Resources

Archives
 List of Viruses

Virus Archives

Virus Advisory - Code Red Worm 8/16/01 3:13pm

Use this tool from Microsoft to remove Code Red:
Code Red Removal Tool

Updated - A Code Red Worm variant, W32/CodeRed.c has been reported by NAI to be "in the wild". Minimum Dat and Scan Engine to detect and clean the backdoor installed by this new worm is Dat 4156 and Scan Engine 4.1.40. Applying the security patch for the original Code Red worm provides protection against W32/CodeRed.c, which uses the same exploit as the original.

This worm affects Servers and Desktops running Microsoft IIS (Windows NT4, Windows 2000 and beta XP). The worm takes advantage of a known buffer overflow security flaw in IIS. The infected host displays the web page:

Welcome to http://www.worm.com !

Hacked By Chinese!

The worm also scans for other machines to infect. It exists only in memory, and does not write files to the hard drive of the infected host. Consequently, rebooting the infected host will remove the worm. The host will remain vulnerable until it is patched! Because the worm does not write to the hard drive, current desktop and server antivirus products will not provide protection from this worm. The only reliable protection is to patch all vulnerable systems.
The Microsoft security patchs for IIS 4.0 and IIS 5.0 are available at http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/ms01-044.asp

For more Information see:

This archive is not intended to be comprehensive. For a more complete virus library, please visit NAI's Virus Information Library at http://vil.nai.com.

Contact NIH Help Desk for assistance:
866-319-4357 (toll free), 301-496-4357 (6-HELP) (local), 301-496-8294 (TDD)
http://ithelpdesk.nih.gov/support
Register for iForgotMyPassWord

National Institutes of HealthCenter for Information Technology
National Institutes of Health
Bethesda, Maryland 20892

Questions or Comments | Disclaimers | Privacy Policy

Department of Health and Human ServicesHealth and Human Services
Washington, D.C. 20201
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -