Port No | 2002 |
Service Name | Unix Slapper.A |
RFC Doc | 0 |
Protocol | UDP |
Description | This Linux worm launches a distributed denial of service (DDOS) attack. It uses the User Data Protocol (UDP) to execute the attack, and takes advantage of a buffer overflow vulnerability in OpenSSL 0.9.6d, 0.9.7-beta2 and earlier versions. |
Reference Link | Unix Slapper.A, |
Attack | Solutions: Scan your system with Trend Micro antivirus and delete all files detected as ELF_SLAPPER.A. To do this, Trend Micro customers must download the latest pattern file and scan their system. NOTE: This malware exploits certain vulnerabilities in OPENSSL. An upgrade to OPENSSL 0.9.6e, 0.9.7beta3, or later versions is strongly recommneded. |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.