Hello!
You’re about to visit our web page in English
Would you like to continue?
If this is not what you’re looking for,
This offer ends in:
Hours
Minutes
Seconds
-50% on all Panda Dome products
Virus Encyclopedia
Welcome to the Virus Encyclopedia of Panda Security.
Slammer | |
Threat Level Damage Distribution |
Slammer follows the infection routine below:
Slammer does not create or modify files or entries in the Windows Registry.
Slammer is sent to the affected server from another SQL server. Once it gets into the machine, Slammer looks for other machines that act as SQL servers in order to infect them. It does this by exploiting a buffer overrun vulnerability, which exists in servers that do not have Service Pack 3 installed.