Skip to main content
Published Apr 16, 2007 | Updated Sep 15, 2017

Exploit:Win32/Siveras.B

Detected by Microsoft Defender Antivirus

Aliases: Win32/IRCBot.worm.199680.I (AhnLab) W32/Backdoor.AMIF (Command) Backdoor.VanBot.AN (BitDefender) Win32/Nirbot.AU (CA) BackDoor.IRC.Sdbot.1299 (Dr.Web) Wi3n2/Rinbot.AA (ESET) Backdoor.Win32.VanBot.bx (Kaspersky) W32/Nirbot.worm!83E1220A (McAfee) W32/Rinbot.A (Norman) W32/Rinbot.Q.worm (Panda) W32/Delbot-AI (Sophos) W32.Rinbot.BC (Symantec) WORM_VANBOT.GC (Trend Micro) Backdoor.Vanbot.CM (VirusBuster)

Summary

Exploit:Win32/Siveras.B is detection for specific known malware used to exploit a vulnerability in the Domain Name System (DNS) Server Service. This vulnerability impacts Microsoft Windows 2000 Server Service Pack 4, Windows Server 2003 Service Pack 1, and Windows Server 2003 Service Pack 2.
 
Note that exploit of the vulnerability may not be file-based or the malicious files might be removed by the attacker after successful exploit. For vulnerability details, workarounds, and patch information, please refer to Microsoft Security Advisory (935964).
Manual removal is not recommended for this threat. To detect and remove this threat and other malicious software that may have been installed, run a full-system scan with an up-to-date antivirus product such as Microsoft Security Essentials, or the Microsoft Safety Scanner. For more information about using antivirus software, see http://www.microsoft.com/security/antivirus/av.aspx.
Follow us