Virus Infection Detection (deprecated)

Critical Nessus Plugin ID 11329

Synopsis

This plugin has been deprecated.

Description

This script checks for the presence of different viruses on the remote host, by using the SMB credentials that you provide to Nessus.

- W32/Badtrans-B
- [email protected]
- W32/Vote-A
- W32/Vote-B
- CodeRed
- [email protected]
- [email protected]
- [email protected]
- [email protected]
- [email protected]
- [email protected]
- [email protected]
- [email protected]
- [email protected]
- [email protected]
- [email protected]
- [email protected]
- W32.Welchia.Worm
- W32.Randex.Worm
- W32.Beagle.A
- W32.Novarg.A
- Vesser
- NetSky.C
- Doomran.a
- Beagle.m
- Beagle.j
- Agobot.FO
- NetSky.W
- Sasser
- W32.Wallon.A
- W32.MyDoom.M
- W32.MyDoom.AI
- W32.MyDoom.AX
- W32.Aimdes.B
- W32.Aimdes.C
- W32.ahker.D
- Hackarmy.i
- W32.Erkez.D/Zafi.d
- Winser-A
- Berbew.K
- Hotword.b
- W32.Backdoor.Ginwui.B
- W32.Wargbot
- W32.Randex.GEL
- W32.Fujacks.B

Note: This plugin has been deprecated due to the false positive rate and age of the plugin.

Plugin Details

Severity: Critical

ID: 11329

File Name: smb_virii.nasl

Version: 1.84

Type: local

Agent: windows

Family: Windows

Published: 2003/03/08

Updated: 2019/08/21

Dependencies: 13855, 10400, 10150, 10394

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: SMB/name, SMB/login, SMB/password, SMB/registry_access