Buggy McAfee update whacks Windows XP PCs
McAfee's popular antivirus software failed spectacularly on Wednesday, causing tens of thousands of Windows XP computers to crash or repeatedly reboot.
A buggy update that the company released early in the day turned the software's formidable defenses against malicious software inward, prompting it to attack a vital component of Microsoft Windows. The update was available for business customers for about four hours before distribution was halted, McAfee said.
The damage was widespread: the University of Michigan's medical school reported that 8,000 of its 25,000 computers crashed. Police in Lexington, Ky., resorted to hand-writing reports and turned off their patrol car terminals as a precaution. Some jails canceled visitation, and Rhode Island hospitals turned away non-trauma patients at emergency rooms and postponed some elective surgeries.
Intel was also hit by McAfee's bungled update, a source inside the company confirmed to CNET. The source said that all Intel's computers inside the United States ran McAfee and many were affected but didn't know how many or whether it impacted the company's factories.
The update released at 6 a.m. PT effectively redirected the PC's immune system, causing it to attack a legitimate operating system component known as SVCHOST.EXE in the same way that some diseases can cause the human immune system to turn inward. In this case, McAfee's application incorrectly confused it with malware known as the W32/Wecorl.a virus.
McAfee apologized to customers for the problem, which seemed to affect primarily Windows XP computers running Microsoft's Service Pack 3, but downplayed its impact. "We are not aware of significant impact on consumers," the company said in a statement sent to CNET at 2 p.m. PT.
Screen snapshot of CNET News editor's computer in Portland after McAfee was causing her computer to reboot.
(Credit: CNET)That didn't endear the company to the enterprise users who were the most affected by the update, especially system administrators who were forced to trek from computer to computer and manually install the repair that McAfee had made available by midday. It's not clear how many customers were affected, and a McAfee representative said she did not have an update. (Here's a related CNET article on how to fix your McAfee-crippled PC.)
Tech-related mailing lists soon began buzzing with complaints. And the condemnation on Twitter was unrelenting, with Sonny Hashmi, the deputy chief information officer of the District of Columbia, calling it a "huge disruption," adding that McAfee is now on his "blacklist." An engineer in San Francisco said that, thanks to McAfee, "the wait at my work is two days and growing to get your laptop back." Others complained that, approximately six hours after the problem was known, McAfee has yet to post a note on the home page--which currently boasts of "technology to supercharge your network security."
A CNET editor in Portland, Ore., was affected Wednesday morning when the update caused her computer to lose network and Internet connections and McAfee prevented her from launching programs or uninstalling it.
A report at the Internet Storm Center said the errant McAfee update registered a false positive that flagged the Windows file SVCHOST.EXE as a virus.
Compounding what seems to be a day of snafus for the Santa Clara, Calif.-based company was its initial recommendation that users encountering the problem download a file from a McAfee support site. But after tens of thousands of irate users flooded into the forums, the site abruptly went offline and began to return an error message.
McAfee has posted a Web page on a separate site with detailed instructions on how to fix XP computers that have been crashing because of Wednesday's update. It recommends manually downloading and installing an "EXTRA.DAT" file and then restore files that have been incorrectly quarantined.
But that option requires a least a modest amount of technical ability, and as of 4 p.m. PDT, the company had not offered a better way. "McAfee is continuing to work on an automated solution," the page said.
Last update 10:20 p.m. PT: McAfee has posted a statement saying that the problem affected "one half of 1 percent of our enterprise accounts globally and a fraction of that" among home users. Another post from Barry McPherson, executive vice president for customer service, apologizes for the snafu and says: "Mistakes happen. No excuses." And it looks like the company has posted some more details about how SVCHOST.EXE was targeted.
* Suck it down, WinTards! My {Mac || Linux Box} rocks!
* ha-ha! I have (insert some other A/V solution here)!
* What? I've used Windows for full geological eons without A/V, and I've NEVER, EVER been infected! Ever!
* Upgrade to Windows 7! It's great! It rocks! (or some variation of "please spend your money and bolster Microsoft's bottom line so we have some bragging points come the next fiscal quarter... please?")
* (I will save this article, then use it to blame anyone but Microsoft whenever Microsoft itself screws the pooch in some programmatic or performance fashion).
Cheers!
*
* Why should I care that my Windows machine is down/dead? I get paid by the hour sitting at a malfunctioning machine doing nothing productive! HAHAHAHA!
[CNET editor's note: Offensive content deleted]
Avast + upgrade from XP
I will save this article, then use it to blame, smear or otherwise promote FUD against Microsoft whenever Microsoft does something good and I want to cast doubt. I must preserve my prediction at all costs that Microsoft is on the downhill slide to irrelevancy.
As a web developer it's not really my job to do the IT work but part of my job specs is to make sure the website is secure, so I obviously keep track what's happening.
Can you believe they had the cheek to say "how the hell did you know when I didn't" - I think I should have asked that question in reverse.
What a contrived way to say that the machine automatically reboots 60 seconds after login over and over and over.
Evidently, McAfee has decided not regression test on Windows XP anymore.
They need to tell the lawyers to go stuff themselves, drop the spin, admit they royally screwed up, and then bend over backwards to correct. Otherwise, I am sure there will be several Enterprise customers shopping for a new A/V solution by Monday.
Vicious cycle.
--Sam
Kaseya is quite good as part of a managed services offering.
Forefront is good too (scanning engine is better and better...and unobtrusive)
At least, if these products ever do something as asinine as what McAfee does on a nearly-yearly basis, you won't have been paying through the nose for it.
On my personal PCs, I stopped getting viruses and losing data when I stopped using McAfee and Norton 10 years ago (oddly, the two most touted AV programs by internet forums that know nothing about how to rate a product... eh hem... nudge nudge...).
I hope my company holds McAfee financially liable and learns which websites consider historical results instead of under-the-table-payoffs in their reviews of such software. I know... maybe we need another iPad article, that should fix everything...
I can't blame anyone using Sophos, MCafee or Trend. They don't have choice even.
awesome
2) Go and delete the dat file from epo
3) Force update the 5959 DAT (can be done from dashboard)
4) Select all systems, and force a SuperWakeup once the 5959 dat has been downloaded That should start pushing out the dat... Hopefully it fixes everything.
My major concern would be how to smoothly restore machines that have already been affected back to full functioning.
This isn't the first time this has happened. AV developers are getting sloppy lately. Unacceptable. Yes scanners need to look at and ocassionally deal with infections in win32.dll and svchost but any act that may affect those files should be THOROUGHLY tested through QA before release.
I wrote up some removal instructions here:
http://www.adfrad.com/2010/04/fixing-mcafee-w32wecorla-false-alerts.html
Good luck eveyone!
by copying svchost from a good xp computer and pasting into the "damaged one"
then deleting the avv files from c:\program files \common files\mcaffee\engine(shift delete)
that was for the first set of problem computers.
the other set we fixed by grabbing the extra.dot file from mcaffee website and pasting it into c:\program files \common files\mcaffee\engine
(my back hurts) and my head!
My fix on each pc after rolling back dat update in EPO and stopping repository scheduled pulls...
1) Restart into safe mode command prompt.
2) Navigate (cd) to c:\program files\common files\mcafee\engine\oldengine
3) copy av*.dat ..
4) Navigate to windows directory
5) copy svchost.exe from the %windir%\ServicePackFiles\i386 to %windir%\system32
6) reboot
Now, I'm waiting for McAfee for a reasonable explanation for how this happened, and why I should renew my company's grant.