1. Symantec/
  2. Security Response/
  3. W32.Lirva.A@mm


Risk Level 2: Low

January 7, 2003
February 13, 2007 11:42:07 AM
Also Known As:
W32/Avril-A [Sophos], W32/Lirva.b@MM [McAfee], WORM_LIRVA.A [Trend], Win32.Lirva.A [CA], I-Worm.Avron.c [KAV], Lirva [F-Secure]
Systems Affected:
CVE References:

NOTE: Due to a decreased rate of submissions, Symantec Security Response has downgraded this threat from a Category 3 to a Category 2 as of February 28, 2003.

W32.Lirva.A is a mass-mailing worm that also spreads by IRC, ICQ, KaZaA, and open network shares. This worm attempts to terminate antivirus and firewall products. It also emails the cached Windows 95/98/Me dial-up networking passwords to the virus writer.

When Microsoft Outlook receives the worm, the worm takes advantage of a vulnerability that allows the attachment to auto-execute when you read or preview the email. Information on this vulnerability and a patch can be found at http://www.microsoft.com/technet/security/bulletin/MS01-020.asp.

If the day of the month is the 7th, 11th, or 24th, the worm will launch your Web browser to www.avril-lavigne.com and display a graphic animation on the Windows desktop.

Antivirus Protection Dates

  • Initial Rapid Release version January 7, 2003
  • Latest Rapid Release version August 8, 2016 revision 023
  • Initial Daily Certified version January 7, 2003
  • Latest Daily Certified version August 9, 2016 revision 001
  • Initial Weekly Certified release date January 7, 2003
Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.
Writeup By: Atli Gudmundsson

Search Threats

Search by name
Example: W32.Beagle.AG@mm
STAR Antimalware Protection Technologies
2016 Internet Security Threat Report, Volume 21
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube