McAfee update glitch kills email servers

By
Follow google news

Six products affected.

McAfee update glitch kills email servers

A glitched update released last week caused McAfee security products to crash, affecting email systems.

The affected update (DAT 66822) was pushed out to corporate customers and affected six McAfee poducts including email and web security, email gateway, and GroupShield.

McAfee said users should not upgrade to the affected DAT file and instead apply the subsequent fixed update (DAT 66823).

Sydney IT administrator Jackie Chen said the error caused his large organisation’s Exchange server to crash.

“The bloody McAfee [sic] caused another trouble yesterday by re-releasing the new DAT 6682,” he said.

“The only thing you can do is to revert the DAT back to 6681 in both ePO master repository and the mail server.”

Another commentator on the SANS Internet Storms Centre said the glitch caused email at US IT services company Axway to jam up.

Axway spammed me all day because of this. It's causing their email security products to fail and queue email,” they said.

Users would need to manually remove large dump files produced when McAfee products including GroupShield and Security for Exchange/Domino and VirusScan crashed.

The glitched update would be resolved in most products by applying automatic updates, however users of McAfee’s ePolicy Orchestrator would need to follow manual remediation steps.

Got a news tip for our journalists? Share it with us anonymously here.

Copyright © SC Magazine, Australia

Tags:

Most Read Articles

Labor bets on agency to monitor AI companies

Labor bets on agency to monitor AI companies

Australia, US and UK sanction Russian cyber firms over ransomware links

Australia, US and UK sanction Russian cyber firms over ransomware links

Startup finds flaws in popular VoIP products

Startup finds flaws in popular VoIP products

JPMorgan, Citi, Morgan Stanley client data may be exposed by vendor's hack

JPMorgan, Citi, Morgan Stanley client data may be exposed by vendor's hack

Log In

  |  Forgot your password?