Sunday, January 15, 2012

File of system of McAfee manslaughter Windows tens of 10 thousand PC restart often

Bit net (Chinabyte)4 month 23 days of messages, according to foreign media coverage, the software that reduce toxin produces document of system of Windows of the manslaughter when business McAfee Zhousan undertakes software is updated, bring about the whole world to produce large-scale computer breakdown, co the most popular selling dog crates large unt 100 thousand computer to restart for many times at least.



McAfee affirms, zhou San's software brings about enterprise edition McAfee newlier to kill poisonous software to consider as Windows system file harmful file by accident. Later, mcAfee already repair software issue, offer the download that software updates afresh.



McAfee does not have most station computer to be affected certainly, in light of the reaction that goes up through the net nevertheless, the orgnaization such as global hospital, enterprise and school has 100 thousand several to computer updates breakdown because of McAfee and suffer an effect at least. McAfee expresses, common edition McAfee kills poisonous software to did not appear this one problem. Current, mcAfee is investigating the matter of this one incident, will adopt measure to prev the best selling dog stairsent similar incident to happen again.



This one breakdown also brings about a hospital to stop the injury deals with outside the part, force fuzz to shut the computer inside the car. According to the information that appears on Twitter, intel also gets the influence of this one breakdown, do not cross Intel have not at this point buy is judged.



McAfee is in statement to user excuse, say to still sign up for the account that produce this by accident in investigation. This incident affects global range the enterprise user of 0.5% dvd discovery channel and partial family user.



   State for McAfee below textual:



Media friend of respect:



Go 24 hours, michael humble identifies a new menace that affects Windows PC. Our researcher works conscientiously to aim in order to solve this to atttack important Windows system executable file and oneself " conceal " the menace in computer memory.



Be aimed at this one menace, our research group had been excogitated detect and cleared method. The quality that remedied measure to had passed us checks, be in Beijing time on April 21 (on Wednesday) the shape that defined a file with 5958 virus at 21 o'clock is released.



We notice as a result of,a few clients were encountered this second release bring about sign up for a problem by accident. Preliminary investigation shows, this one mistake is met major even problem waits in bringing about to run the system of Windows X dog crates large strong P Service Pack 3. Of existence blemish poor very quickly already newlier from all Michael in downloading a server, delete, in order to avoid further to business c dog crates large lient generation effect. This incident affects the enterprise user of 0.5% and user of one fraction family are less than inside global limits only.



Michael humble group be ready in take action provides support to get the client of the influence, this is current the urgentest task. We acted quickly still to release updated virus to define a file namely inside several hours (5959) , the client that is us offers detailed guideline to revamp the system that suffers an effect in order to help its. We are being investigated reason that signs up for problem happening by accident, will adopt relevant measure to prevent similar incident to happen agai dog stairs and ramps n.



To giving our client brought inconvenience from this, we express regret greatly!



We already had resumptive solution to was offerred by the client that signs up for an influence by accident, the detail is as follows:



The solution that signs up for by accident about the W32/wecorl.a in 5958 DAT:



DAT 5958 autograph is updated medium signing up for by accident is a Downloader menace that calls W32/wecorl.a, this menace can read fetch the information from exterior site, the DCOM that affects a system serves. This is met to exploit Microsoft loophole by the menace of discovery recently (MS08) carries out attack. The meeting when the memory that runs a course when scanning calls this progress.



Michael humble evaluates logistic and insufficient rigor in the light of what this browbeats, accordingly, the system that causes a few clients appeared problem.



Can use dog crates large breed Extra DAT to undertake resumptive, move is as follows:



1. Start a system with safe mode, enable " Network Option " (network option)



2. Duplicate Extra DAT C:\Program Files\commonfiles\mcafee\engine



3. If be in C:\Svchost.exe of the existence below Win dvd discovery 4 dows\system32 and either one " 0 " byte file, jump to measure directly 5



4. If Svchost.exe already was deleted, enable VSE console, open " Quarantine Manager " (segregation management implement) . Click detect, choose " Restore " (reductive)



spring pool

O if VSE console cannot call:



C:\Program Files\mcafee\virusscan Enterprise\mcconsol.exe /standalone



This will enable VSE console. Click detect, choose " Restore " (reductive)



O if measure 4 and 4.1 do not act well or Svchost.exe is " 0 " byte file:



A. When can from this locality (C:\When Windows\ServicePackFiles\i386\svchost.exe) duplicate Svchost.exe, duplicate from this locality please Svchost.exe file arrives C:\Windows\system32



B. Use exterior medium (USB, CD) from the system of uninfluenced duplicate Svchost.exe comes C:\Windows\system32 catalog (same operating system)



If " Paste " (stickup) the function is gray, use the following order:



Ordinal click Start(to begin) ->Run(moves) - > input Cmd



Run following commands " from [name of source \ file] duplicate [] of purpose \ folder "



For example: Copy From X:\Svchost.exe To C:\Windows\system32



5. Restart with regular pattern system



Also can use DAT 5959 to undertake resumptive, move is as follows:



1. Start a system with safe mode, enable " Network Option " (network option)



2. If Svchost.exe was not deleted (examine C:\Windows\system32\svchost.exe) and either " 0 " byte file, and the network can join normally, download 5959 DAT, jump to measure 6



3. If Svchost.exe already was deleted or " 0 " byte file, criterion the network cannot join possibly normally



4. the most popular selling dvd discovery If already deleted Svchost.exe, enable VSE console, open " Quarantine Manager " (segregation management implement) . Click detect, choose " Restore " (reductive)



O if VSE console cannot call:



C:\Program Files\mcafee\virusscan Enterprise\mcconsol.exe /standalone



This will enable VSE console



O if measure 4 and 4.1 do not act well or Svchost.exe is " 0 byte " file:



A. When can from this locality (C:\When Windows\ServicePackFiles\i386\svchost.exe) duplicate Svchost.exe, duplicate from this locality please Svchost.exe file arrives C:\Windows\system32



B. Use exterior medium (USB, CD) from the system of uninfluenced duplicate Svchost.exe comes C:\Windows\system32 catalog (same operating system)



If " Paste " (stickup) the function is gray, use the following order:



Ordinal click Start(to begin) ->Run(moves) - > input Cmd



Run following commands from " [name of source \ file] duplicate [] of purpose \ folder "



For example: Copy From X:\Svchost.exe To C:\Windows\system32



5. Download DAT 5959



6. Restart with regular pattern system

No comments:

Post a Comment