OK, we get the message, Microsoft: Windows Defender splats 1000s of WinXP, Server 2k3 PCs
Anti-malware update gaffe trashes axed OSes
Microsoft has fixed a snafu with Windows Defender that took down thousands of business PCs and servers running Windows XP and Server 2003.
The software giant responded to sysadmins complaining on TechNet that large numbers of their machines were borked after they’d installed Microsoft’s latest set of antivirus definitions.
Once the dodgy signature update for System Center Endpoint Protection (SCEP) and Forefront Endpoint Protection (FEP) had been installed, it caused PCs and servers to hang at logon until Msmpeng.exe, a core part of Windows Defender, crashed.
The only solution to getting affected machines back up was to uninstall the updated signatures.
One sysadmin took to TechNet to complain of 750 knackered PCs, with another claiming he'd seen 3,500 PCs walloped.
The culprit is a group of antivirus definition updates in SCEP and FEP, released on April 16. The versions most complained about were numbers 18.104.22.168, 171.46.0 and 22.214.171.124.
Redmond told The Reg that applying the latest set of antivirus signatures would rescue affected systems without the need to uninstall the update that caused the problems.
One Reg reader contacted us to say: “Seems like an engine and/or signature update to FEP in combination with a specific setting within FEP crashes FEP, which then knocks out the affected computer from the network.”
A Microsoft spokesperson admitted the company had released an anti-malware engine update that “may have caused interrupted service for customers” using the company’s security products.
The spokesperson said the latest signature update would automatically resolve the issue, implying there’s no need to uninstall the faulty signatures.
“Customers who have developed the most recent signatures do not need to take an action,” the spokesperson said.
Such problems are critical because security products like SCEP and Forefront are now Microsoft’s first and last line of defence for users against malware writers since Microsoft axed all support for Windows XP, and stopped releasing security patches for the ageing operating system, on April 8 this year. Windows Server 2003 remains supported until 14 July, 2015.
The advice for those still running Windows XP and Windows Server 2003 is to apply all the latest anti-virus patches and signatures to systems to try and stay safe. ®
Thanks to Reg reader Nik for the tip.
Sponsored: Global DDoS threat landscape report