Feeds

OK, we get the message, Microsoft: Windows Defender splats 1000s of WinXP, Server 2k3 PCs

Anti-malware update gaffe trashes axed OSes

Internet Security Threat Report 2014

Microsoft has fixed a snafu with Windows Defender that took down thousands of business PCs and servers running Windows XP and Server 2003.

The software giant responded to sysadmins complaining on TechNet that large numbers of their machines were borked after they’d installed Microsoft’s latest set of antivirus definitions.

Once the dodgy signature update for System Center Endpoint Protection (SCEP) and Forefront Endpoint Protection (FEP) had been installed, it caused PCs and servers to hang at logon until Msmpeng.exe, a core part of Windows Defender, crashed.

The only solution to getting affected machines back up was to uninstall the updated signatures.

One sysadmin took to TechNet to complain of 750 knackered PCs, with another claiming he'd seen 3,500 PCs walloped.

The culprit is a group of antivirus definition updates in SCEP and FEP, released on April 16. The versions most complained about were numbers 1.171.1.0, 171.46.0 and 1.171.39.0.

Redmond told The Reg that applying the latest set of antivirus signatures would rescue affected systems without the need to uninstall the update that caused the problems.

One Reg reader contacted us to say: “Seems like an engine and/or signature update to FEP in combination with a specific setting within FEP crashes FEP, which then knocks out the affected computer from the network.”

A Microsoft spokesperson admitted the company had released an anti-malware engine update that “may have caused interrupted service for customers” using the company’s security products.

The spokesperson said the latest signature update would automatically resolve the issue, implying there’s no need to uninstall the faulty signatures.

“Customers who have developed the most recent signatures do not need to take an action,” the spokesperson said.

Such problems are critical because security products like SCEP and Forefront are now Microsoft’s first and last line of defence for users against malware writers since Microsoft axed all support for Windows XP, and stopped releasing security patches for the ageing operating system, on April 8 this year. Windows Server 2003 remains supported until 14 July, 2015.

The advice for those still running Windows XP and Windows Server 2003 is to apply all the latest anti-virus patches and signatures to systems to try and stay safe. ®

Thanks to Reg reader Nik for the tip.

Internet Security Threat Report 2014

More from The Register

next story
UNIX greybeards threaten Debian fork over systemd plan
'Veteran Unix Admins' fear desktop emphasis is betraying open source
Netscape Navigator - the browser that started it all - turns 20
It was 20 years ago today, Marc Andreeesen taught the band to play
Redmond top man Satya Nadella: 'Microsoft LOVES Linux'
Open-source 'love' fairly runneth over at cloud event
Chrome 38's new HTML tag support makes fatties FIT and SKINNIER
First browser to protect networks' bandwith using official spec
Admins! Never mind POODLE, there're NEW OpenSSL bugs to splat
Four new patches for open-source crypto libraries
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.