Feeds

McAfee virus update damages NT 4.0 files

Users urged to upgrade product software

  • alert
  • submit to reddit

New hybrid storage solutions

An update to Network Associates' McAfee VirusScan anti-virus software has been found to damage the master boot record of Windows NT 4.0 computers, forcing customers to reinstall their operating systems.

The problem occurred because of a conflict between VirusScan/Netshield 4.0.2 - which is now two years old - and the 4120/4110 SuperDAT utility, which automatically updates antivirus protection with a file that contains the latest signature profiles.

Users of the old virus scan engine using the 4120/4110 SuperDat utility were confronted with the alarming message on rebooting: "Operating System Not Found".

In a statement Network Associates said it had pulled the suspect virus definition (or .DAT) libraries and reposted files which do not cause the conflict. It also said that even if the MBR is damaged programs and data on the hard disk should be safe, so reinstalling the operating system will restore the MBR.

"The incompatibility was with a product that was over two years old. It's imperative that people update not only their engine and dats, but also the product itself regularly as new versions are released to ensure up-to-date protection from malicious code," the statement said.

Network Associates builds its virus detection software from three component technologies: a product executable, the scan engine and the virus definition libraries, which contain signatures of the latest viruses. The SuperDAT utility updates the scan engine and virus definition libraries.

The latest version of the VirusScan/NetShield program executable is 4.5 and users are recommended to upgrade to that.

Only last month a similar conflict occurred between another older scan engine and a virus definition file. This raises the interesting question of why Network Associates allows the latest virus updates work with older versions of its scanning engine - but unfortunately no-one from Network Associates was available to field this question.

Conflicts are inevitable, and can be expected again, because the update utility makes assumptions about the functions available in the executable. Other vendors make the latest virus definition files incompatible with older scanning engines and it would make a lot of sense for Network Associates to adopt this approach. ®

Security for virtualized datacentres

More from The Register

next story
Not appy with your Chromebook? Well now it can run Android apps
Google offers beta of tricky OS-inside-OS tech
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
NHS grows a NoSQL backbone and rips out its Oracle Spine
Open source? In the government? Ha ha! What, wait ...?
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.