Moderatori: m.paolo, kadosh, Luke57
Scan initiated on Sun Jan 26 15:52:40 2003
C:\Programmi\Microsoft SQL Server\MSSQL\Binn\sqlservr.exe
Found the W32/SQLSlammer.worm virus !!!
C:\Programmi\Microsoft SQL Server\MSSQL\Binn\sqlservr.exe has been repaired.
C:\Programmi\Microsoft SQL Server\MSSQL\Binn\sqlservr.exe
Found the W32/SQLSlammer.worm virus !!!
C:\Programmi\Microsoft SQL Server\MSSQL\Binn\sqlservr.exe has been repaired.
Number of clean files: 840
Number of files repaired: 1
pjfry ha scritto:ho appena visto sul tg2 un servizio sull'attacco di oggi del virus SQ HELL che avrebbe bloccato 14000 uffici postali
l'esperto per spiegarlo ai profani ha detto che "è come se un solo utente ricevesse contemporaneamente milioni di telefonate"... cioè sarebbe un attacco denial of service? il virus si installa sui computer di utenti ignari e ad una certa ora prova a collegarsi al sito delle poste?
Microsoft originally released this bulletin and patch on October 16, 2002 to correct a security vulnerability in a SQL Server stored procedure. The patch was and still is effective in eliminating the security vulnerability, and includes the fix for the vulnerability exploited by the "Slammer" worm virus (Note: Slammer affects only SQL Server 2000 and MSDE 2000). However, while the patch was fully effective in eliminating the security vulnerability, in October, 2002, it was found to interfere with SQL Server operations under some circumstances. As a result, on October 30, 2002, an additional non-security hotfix (317748) was required to ensure normal operations of SQL Server.
In order to simplify the process by which customers update their systems, Microsoft has now re-released the patch for SQL Server 2000. The patch for SQL Server 2000 was re-released to help customers patch their systems in response to the "Slammer" worm virus. The re-released patch integrates the original security patch released with this bulletin and the hotfix discussed in Microsoft Knowledge Base article 317748 that was released to ensure the correct operation of SQL Server. The re-release has been packaged with a new SQL Server patch installer. The installer eliminates the need for system administrators to copy SQL Server files onto their systems manually. The only changes that Microsoft has made to this patch were to incorporate the hotfix discussed in Microsoft Knowledge Base article 317748 into the re-released patch and to package the patch with an installer.
Customers who have not already applied the patch originally released with this bulletin should apply the re-released patch. Customers who have already applied to their SQL 2000 systems both the original security patch and hotfix 317748 do not need to apply this re-released patch – the original patches are effective in ensuring correct operation of SQL Server and in protecting SQL Server systems (including protection from the Slammer worm). Customers who have applied only the original version of this patch should consider applying the hotfix discussed in Microsoft Knowledge Base article 317748, subject to the caveat discussed in the FAQ and caveats sections below.
piercing ha scritto:dado... non esiste removal tool...
dado ha scritto:piercing ha scritto:dado... non esiste removal tool...
Io semplicemente riportavo quanto detto da symantec...
Formattazione basso livello: "unable to lock device... Autore: wangga |
Forum: Sistemi Operativi Windows Risposte: 10 |
Visitano il forum: Nessuno e 31 ospiti