Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
SQL Slammer
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Short description|2003 computer worm}} {{Infobox malware | common_name = SQL Slammer | image = | caption = | image2 = | caption2 = | technical_name = | Aliases = | Type = [[Computer worm]] | subtype = | classification = | family = | isolation_date = | Origin = 2003 | Author = <!-- Cyberattack --> | Date = | Location = | Theme = | Target = | outcome = | losses = | suspect = | convicted = | sentence = <!-- Technical --> | version = <!-- or variant --> | OS = [[Microsoft Windows]] | package = | filename = | filetype = | filesize = | exploit = | ports_used = | language = | discontinuation_date = | version1 = <!-- or variant1 -- Can be repeated up to 5 times by changing the number--> | OS1 = <!--Can be repeated up to 5 times by changing the number--> | package1 = <!--Can be repeated up to 5 times by changing the number--> | filename1 = <!--Can be repeated up to 5 times by changing the number--> | filetype1 = <!--Can be repeated up to 5 times by changing the number--> | filesize1 = <!--Can be repeated up to 5 times by changing the number--> | exploit1 = <!--Can be repeated up to 5 times by changing the number--> | ports_used1 = <!--Can be repeated up to 5 times by changing the number--> | language1 = <!--Can be repeated up to 5 times by changing the number--> | discontinuation_date1 = <!--Can be repeated up to 5 times by changing the number--> }} '''SQL Slammer'''{{efn|Other names include W32.SQLExp.Worm, DDOS.SQLP1434.A, the Sapphire Worm, SQL_HEL, W32/SQLSlammer and Helkern.<ref>{{cite web |url=http://www.symantec.com/security_response/writeup.jsp?docid=2003-012502-3306-99 |archive-url=https://web.archive.org/web/20061110180054/http://www.symantec.com/security_response/writeup.jsp?docid=2003-012502-3306-99 |url-status=dead |archive-date=10 November 2006 |title=Symantec W32.SQLExp.Worm}}</ref>}} is a 2003 [[computer worm]] that caused a [[denial of service]] on some [[Internet]] hosts and dramatically slowed general [[Internet traffic]]. It also crashed routers around the world, causing even more slowdowns. It spread rapidly, infecting most of its 75,000 victims within 10 minutes. The program exploited a [[buffer overflow]] bug in Microsoft's [[Microsoft SQL Server|SQL Server]] and [[MSDE|Desktop Engine]] database products. Although the [https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-039 MS02-039] (CVE-2002-0649)<ref>{{Cite web |title=CVE - CVE-2002-0649 |url=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0649 |access-date=2023-09-07 |website=cve.mitre.org}}</ref> patch had been released six months earlier, many organizations had not yet applied it. The most infected regions were Europe, North America, and Asia (including East Asia and India).<ref>{{cite web |last1=Mezquita |first1=Ty |title=SQL Slammer Virus (Harbinger of things to come) |url=https://cyberhoot.com/cybrary/sql-slammer-virus/ |website=CyberHoot |date=12 February 2020}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)