Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Tests for Nimda Worm infected HTML files

Vulnerability Assessment Details

Tests for Nimda Worm infected HTML files

Vulnerability Assessment Summary
Tests for Nimda Worm infected HTML files

Detailed Explanation for this Vulnerability Assessment
Your server appears to have been compromised by the
Nimda mass mailing worm. It uses various known IIS
vulnerabilities to compromise the server.

Anyone visiting compromised Web servers will be prompted to
download an .eml (Outlook Express) email file, which
contains the worm as an attachment.

Also, the worm will create open network shares on the infected
computer, permiting access to the system. During this process
the worm creates the guest account with Administrator rights.

Solution: Take this server offline immediately, rebuild it and
apply ALL vendor patches and security updates before reconnecting
server to the internet, as well as security settings discussed in
Additional Information section of Microsoft's web site at

Check ALL of your local Microsoft based workstations for infection.
Note: this worm has already infected more than 500,000 computers
worldwide since its release in late 2001.


Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2001 Matt Moore

Cables, Connectors


No Discussions have been posted on this vulnerability.