Virus Infection Detection

Critical Nessus Plugin ID 11329

Synopsis

A virus has been detected on the remote host.

Description

This script checks for the presence of different viruses on the remote
host, by using the SMB credentials that you provide to Nessus.

- W32/Badtrans-B
- [email protected]
- W32/Vote-A
- W32/Vote-B
- CodeRed
- [email protected]
- [email protected]
- [email protected]
- [email protected]
- [email protected]
- [email protected]
- [email protected]
- [email protected]
- [email protected]
- [email protected]
- [email protected]
- [email protected]
- W32.Welchia.Worm
- W32.Randex.Worm
- W32.Beagle.A
- W32.Novarg.A
- Vesser
- NetSky.C
- Doomran.a
- Beagle.m
- Beagle.j
- Agobot.FO
- NetSky.W
- Sasser
- W32.Wallon.A
- W32.MyDoom.M
- W32.MyDoom.AI
- W32.MyDoom.AX
- W32.Aimdes.B
- W32.Aimdes.C
- W32.ahker.D
- Hackarmy.i
- W32.Erkez.D/Zafi.d
- Winser-A
- Berbew.K
- Hotword.b
- W32.Backdoor.Ginwui.B
- W32.Wargbot
- W32.Randex.GEL
- W32.Fujacks.B

Solution

See the URLs that will appear in the report.

Plugin Details

Severity: Critical

ID: 11329

File Name: smb_virii.nasl

Version: Revision: 1.83

Type: local

Agent: windows

Family: Windows

Published: 2003/03/08

Modified: 2016/12/09

Dependencies: 10150, 10394, 13855, 10400

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C