Botched McAfee update hits XP users

Powered by SC Magazine
 

Users advised to update after crashes reported.

McAfee is scrambling to update its antivirus products after a recent update caused system crashes.

The update, known as 5958 DAT, was released early Wednesday and later removed following reports that the update was causing "blue screen of death" and DCOM errors in some Windows XP SP3 systems.

The issue occurs after the update is applied and a security scan is initiated.

The update can record a false positive report, alerting the user-of a non-existent infection from the W32/wecorl.a malware.

Following the report the system encounters an error and shuts down.

A story in the Sydney Morning Herald today revealed that the bug had caused some problems for supermarket chain Coles, among others.

After the crashes were reported, McAfee fixed the damaged DAT file and removed the offending components.

Systems which were updated after Wednesday morning US Pacific Time should not be subject to the error.

To remedy the issue on systems that have experienced the crash, McAfee has posted a new DAT file. The company is advising users and administrators to start up the damaged systems in Safe Mode and manually replace the offending DAT file and then restore any affected files from the quarantine folder.

Users can also remedy the issue by copying the svchost.exe application from an unaffected system and replacing it on the damaged system.

Copyright ©v3.co.uk


Botched McAfee update hits XP users
 
 
 
Top Stories
ATO shaves $4m off IT contractor panel
Reform cuts admin burden, introduces KPIs.
 
Turnbull introduces data retention legislation
Still no definition of metadata to be stored.
 
Crime Commission prepares core systems overhaul
Will replace 30 year-old national criminal database.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  27%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  25%
TOTAL VOTES: 432

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  54%
 
No
  46%
TOTAL VOTES: 208

Vote