home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Handbook of Infosec Terms 2.0
/
Handbook_of_Infosec_Terms_Version_2.0_ISSO.iso
/
text
/
virusl
/
vl04_083.txt
< prev
next >
Wrap
Internet Message Format
|
1996-09-04
|
20KB
From: Kenneth R. van Wyk (The Moderator) <krvw@CERT.SEI.CMU.EDU>
Errors-To: krvw@CERT.SEI.CMU.EDU
To: VIRUS-L@IBM1.CC.LEHIGH.EDU
Path: cert.sei.cmu.edu!krvw
Subject: VIRUS-L Digest V4 #83
Reply-To: VIRUS-L@IBM1.CC.LEHIGH.EDU
--------
VIRUS-L Digest Wednesday, 15 May 1991 Volume 4 : Issue 83
Today's Topics:
re: The Shape of the World (PC)
New VIRx Release (PC)
What's so bad about self-extracting archives?
Tequila virus (PC)
Re: SCAN hangs while checking Window's SOL.EXE file (PC)
Re: CLEAN77 for a network? (PC)
SCAN version 77 compressed? (PC)
Re: SCAN hangs while checking Window's SOL.EXE file (PC)
Re: Trojan version of VIRUSCAN version 78 (PC)
PC Virus Index(PC)
Self-extracting archives
"protection" from research viruses
New Name For FPROT (PC)
VIRUS-L is a moderated, digested mail forum for discussing computer
virus issues; comp.virus is a non-digested Usenet counterpart.
Discussions are not limited to any one hardware/software platform -
diversity is welcomed. Contributions should be relevant, concise,
polite, etc. Please sign submissions with your real name. Send
contributions to VIRUS-L@IBM1.CC.LEHIGH.EDU (that's equivalent to
VIRUS-L at LEHIIBM1 for you BITNET folks). Information on accessing
anti-virus, documentation, and back-issue archives is distributed
periodically on the list. Administrative mail (comments, suggestions,
and so forth) should be sent to me at: krvw@CERT.SEI.CMU.EDU.
Ken van Wyk
----------------------------------------------------------------------
Date: Tue, 14 May 91 14:59:00
From: microsoft!c-rossgr@uunet.uu.net
Subject: re: The Shape of the World (PC)
>From: "David.M.Chess" <CHESS@YKTVMV.BITNET>
>
> Must we? [play the numbers game in scanners] Or rather, given that
> we must at the moment, must we always?
Remember that we can't even get the user community (the folks who
spend their hard earned money to buy my products!) to make backups to
protect themselves. They seem to prefer that somebody do that
protection for them. Obviously if an ad indicates that Product A
protects against 400 viruses -- and it might even be true -- that's
going to offer 25% (or 33%) more protection than one that scans for
"only" 300 viruses.
Do you think the public is going to respond favorably to a condom that
protects against the AIDS virus 99% of the time as compared to one
that protects against it 99.9% of the time -- even when your odds of
getting "hit" with the AIDS virus are pretty slim to begin with.
Maximal Protection! That's what the market seems to clamour for.
And the marketing dudes I work with closely at Microcom tell me what
we can lose a site license because of and where our strong points are:
I recall one site license potential that was lost on our not catching
the Whale Virus in an early cut of our code. You know how difficult
it is to get the Whale Virus to infect something without crashing your
system, right? Well, the site license didn't and that cost a
bunch-o-bucks.
Now, of course, we catch the Whale Virus. The next time a site
license asks we can put on our best Grey Poupon voice and say "Of
course. Of course."
>Is there any hope that the anti-virus community might band together
>(for a moment, at least!) and decide that the numbers game shall be
>played ONLY with viruses that have appeared in reliably-confirmed
>real-world incidents?
Speaking on my own behalf, I hope so. Speaking on behalf of Microcom
(which I can't do in any case), marketing has to stay competitive.
So, when one of our competitors says "Yes, but do you want to risk
even the slightest chance of getting infected with this virus if it
escapes into the wild.", my marketing can respond "Ha! We already
protect you against that nasty virus!".
> I'm not sure; the hope that we might is part of
>why I asked those questions. It would mean restraining ourselves in
>advertising and in talking to the press, getting publications like the
>Virus Bulletin (and others less respectable) to stop using 300+
>viruses, including losers like the Anti-Pascals, in their evaluations,
>and so on.
As long as the advertising works (and is used by the competition) it
would be suicide to drop out of the numbers game -- see my new release
blurb below for an example of why we must continually play the damned
game. Yes, I picked up a bunch-o new strings for this cut of the
code. More important to me, though, are the minor enhancements that
make the code easier to use.
>It might be marketingly impossible, of course. On the other hand, is
>it possible that eventually people making buying decisions will get
>tired of "We Detect 100 More Viruses Than Our Competitors!!!" sorts of
>claims, and be more impressed by "We Detect Every Virus Known To Have
>Caused A Real Infection, and We're <faster, cheaper, easier to use,
>etc>"?
Hear, hear! I would love to be able to impress that upon people
rather than the numbers game. The first people to convince would be
in MIS, though: now how do you convince them that your second point is
more important than the numbers games?
Until then, I have to provide the marketing dudes at Microcom with
ammunition for winning on both points you make.
Ross
------------------------------
Date: Tue, 14 May 91 15:03:18
From: microsoft!c-rossgr@uunet.uu.net
Subject: New VIRx Release (PC)
I'm pleased to announce a new release of the *FREE* scanner we put
out as a demo of Virex-PC. This scanner is completly useable for
scanning against viruses: it is not crippled in any way. The only
difference between it and Virex-PC's scanner (one part of the Virex-PC
package) is in the disinfectors included in the commercially available
product.
Here's the "WHATS.NEW" file.
What's New In VIRx Version 1.4
==============================
Date: 5/11/91
1. VIRx now scans memory above 640K through 1 Meg if the -X command line
option is selected. This feature is added for detection of viruses like
E.D.V. that search high memory for writable RAM, and for protection
against possible infected device drivers that have been loaded high.
Note: Many programs use that area of memory for special disk caching
and this has been noted to have caused some problems with incorrect
results for some machines.
2. If a batch mode is selected, the resulting screens will now time out
if you do not hit a key and the scan will continue. This makes the batch
mode fully useable for unattended operation.
3. When this software becomes outdated, it will warn the user that scanning
with outdated software can result in new viruses being missed. Then the
user can elect to continue the scan anyway. Previous versions of VIRx
would cease to function on the cut-off date; this is no longer the case,
although you are advised to update your software before that date arrives.
We consider VIRx 1.4 to be outdated by October, 1991, although we recommend
obtaining each monthly update of VIRx in any case.
4. VIRx 1.4 detects over 50 newly discovered viruses, bringing the total to
over 400. This was accomplished without slowing down the scanner.
5. VIRx 1.4 can now take multiple targets on the command line, allowing
an entire set of file systems to be scanned:
VIRx C:\ D: E:\thisdir F:\thatdir\thisfile
scans the entire C: disk, the current directory on the D: drive and its
children, the specified directory on the E: drive and its children and
the specified file on the F: drive. Any options you select on the command
line are valid for each target you specify.
6. Both decompression routines, LZEXE and PKLITE, were optimized for
speed of decompression and memory model independence. String selection
of compressed file hits take about 50% as long as did VIRx 1.2.
Problems Corrected from v1.2 :
1. Problem with scanning certain Novell Network server volumes has been
corrected.
2. Execute-only files on Novell Networks are handled properly now on
screen as well as in the log.
3. There was a bug when write-protected files were scanned and discovered
to contain a virus. Fixed.
4. False positive on Marc Perkel's MARXMENU menu compiler Marxcomp.exe,
version 2.27, for the KAMAKAZI virus has been corrected. Our apologies
to Marc.
3. PKLite from PKWare uses a special compression method on unusually highly
compressible files that version 1.2 of VIRx did not decompress properly
every time. This has been corrected, and VIRx 1.4 fully supports all
compression methods used by PKLite as of version 1.05, still including
the -e switch available in PKLite Professional.
------------------------------
Date: Tue, 14 May 91 14:42:00 -0600
From: Keith Petersen <w8sdz@WSMR-SIMTEL20.ARMY.MIL>
Subject: What's so bad about self-extracting archives?
> Only one problem: How do I find out what format the thing was
> archived in in the first place, when all I'm confronted with is a .EXE
> file?
This program will list the directory and archive type of any
self-extracting MS-DOS archive.
WSMR-SIMTEL20.ARMY.MIL [192.88.110.20]
Directory PD1:<MSDOS.ARC-LBR>
Filename Type Length Date Description
==============================================
FV135.ZIP B 8128 910319 View dirs of ARC/DWC/LBR/LZH/PAK/ZIP/ZOO/SFXs
Keith
- - - -
Keith Petersen
Maintainer of SIMTEL20's MSDOS, MISC and CP/M archives - [192.88.110.20]
Internet: w8sdz@WSMR-SIMTEL20.Army.Mil or w8sdz@vela.acs.oakland.edu
Uucp: uunet!wsmr-simtel20.army.mil!w8sdz BITNET: w8sdz@OAKLAND
------------------------------
Date: 14 May 91 16:56:37 -0400
From: "David.M.Chess" <CHESS@YKTVMV.BITNET>
Subject: Tequila virus (PC)
Has this been around for awhile? Just in the last week or so, I've
heard of it from a couple of different, widely separated, places in
Europe, and I hadn't heard of it before. Does anyone have a good
description written up? I'm well into analyzing it, but it's always
nice to have someone else's notes to check myself against. Just how
widespread does it seem? Does anyone know of it "getting lucky"
(shipping with a commercial package, or anything on that order)? DC
------------------------------
Date: Tue, 14 May 91 16:41:00 -0500
From: "Sant." <SSIRCAR@ecs.umass.edu>
Subject: Re: SCAN hangs while checking Window's SOL.EXE file (PC)
icking@gmdzi.uucp (Werner Icking) writes:
> As far as I have seen, the problem does not depend on the version of SCAN.
> It depends on running SCAN under Windows in conjunction with SHARE.
> It seems to me that Windows opens a lot of files and the error occurs if
> SCAN attempts to open one of these files, too.
>
> The problem disappeared on my PC since I replaced loading SHARE by using
> NOSHARE (Simtel or mirror-sites: <MSDOS.SYSUTL>NOSHARE.ZIP)
But I'm running SCAN while I boot up. My system is a 8meg 386-33 w/CACHE and
DOS 3.3, so I don't use SHARE.
- --
+------------------------------------------------------------------------------
+
| Santanu Sircar BITNET: ssircar@umaecs.bitnet
|
| University of Massachusetts/Amherst INTERNET: ssircar@ecs.umass.edu
|
+------------------------------------------------------------------------------
+
------------------------------
Date: Tue, 14 May 91 16:20:00 -0500
From: ONLY 30 MORE CREDIT HOURS AND I'M GONE <ORAND@kuhub.cc.ukans.edu>
Subject: Re: CLEAN77 for a network? (PC)
boone@athena.cs.uga.edu (Roggie Boone) writes:
> I am installing a Local Area Network in our department that will be
> running Novell Netware 386. I am thinking about using the McAffee
> Netscan77 virus detection program. I am curious if there is a network
> version of CLEAN77, or can CLEAN77 remove viruses from a network such
> as described above? Any info would be appreciated.
CLEAN77 works well for networks. I use it for our Netware 2.15
here at the University of Kansas. There is a complementary program
called NETSCAN77 that will scan the server for viruses. Once a virus
has been detected, you use CLEAN77 to cure it.
McAffee and Associates is a very helpful company. I recently
discovered a virus that NETSCAN will not detect on EXE files and
called them and told them about it. They were very helpful and will
be putting out a solution to this problem in a couple of weeks.
Brady...
ORAND@kuhub.cc.ukans.edu
------------------------------
Date: Tue, 14 May 91 16:24:26 -0700
From: p1@arkham.wimsey.bc.ca (Rob Slade)
Subject: SCAN version 77 compressed? (PC)
I have received copies of SCAN version 77, some with the authentic
verification still intact. All show the same file size and validation
codes, and match that in the documentation. I have checked it out
with other virus scanners. (All right, I'm paranoid. In this
business, what else is new?)
SCAN 75 was about 80K, but 77 is 59K. Aryeh has said that Virucide is
compressed. Is SCAN now compressed as well?
(I would have asked Aryeh, but her return-path doesn't work for me.)
=============
Vancouver p1@arkham.wimsey.bc.ca | "If you do buy a
Institute for Robert_Slade@mtsg.sfu.ca | computer, don't
Research into (SUZY) INtegrity | turn it on."
User Canada V7K 2G6 | Richards' 2nd Law
Security | of Data Security
------------------------------
Date: Wed, 15 May 91 00:40:37 +0000
From: mcafee@netcom.COM (McAfee Associates)
Subject: Re: SCAN hangs while checking Window's SOL.EXE file (PC)
SSIRCAR@ecs.umass.edu (Sant.) writes:
>Has anyone had problems with SCANV77? When I scan my hard drive, the
>program hangs on one particular file, SOL.EXE, Window's solitaire
>program. I don't have problems with running the game and SCAN doesn't
>have problems with any other file. In order to continue, I have to
>press 'F' to accept the failure. Does anyone know why this is
>happening?
It sounds like you are exiting to DOS from Windows to run SCAN, and
have a file running under Windows. You can either exit Windows and
then run SCAN, or shut down the Solitaire program and then run SCAN.
Alternatively, you can run SCAN with the /UNATTEND option which will
install a critical error handler that will allow SCAN to automatically
select "Fail" when it comes across a file in use. I would recommend
that if you use the /UNATTEND option, you also use the /REPORT option
so that you will have a record of any files that were skipped.
Aryeh Goretsky
McAfee Associates Technical Support
------------------------------
Date: Wed, 15 May 91 13:19:00 +1200
From: "Mark Aitchison, U of Canty; Physics" <PHYS169@csc.canterbury.ac.nz>
Subject: Re: Trojan version of VIRUSCAN version 78 (PC)
aryehg%darkside.com@apple.com (Aryeh Goretsky) writes:
> We have received a trojan horse version of VIRUSCAN...
>
> Running PKUNZIP on the file reveals the following:
>
> . Authentic files Verified! # TJB859 Zip Source: McAFEE ASSOCIATES
>
> While the Authentic Files Verified Message appears, the Serial Number is
> NOT correct. McAfee Associate's Serial Number is NWM405.
This worries me. Could somebody explain what good the PKUNZIP
authentication system should be, as it obviously isn't providing
enough warning here. (Who would know, and think of looking at, the
serial number? Probably few people).
Mark Aitchison, Physics, University of Canterbury, New Zealand.
------------------------------
Date: Wed, 15 May 91 11:43:30 +0000
From: Ian Leitch - ITU LSHTM - (071) 927 2260 <uqak940@mvs.ulcc.ac.uk>
Subject: PC Virus Index(PC)
In response to the many queries which now appear on Virus-L asking for
specific information about particular viruses, I have uploaded the PC
Virus Index to the MIBSRV "official" anti-viral archives.
The PC Virus Index (PCVI) is developed and maintained by Bryan Clough
(of Clough and Partners) with whose permission it is being made
available. PCVI is a text-linked database about PC viruses which is
delivered through an 'intelligent' front-end. It provides an ever
developing knowledge base about viruses as they emerge. Updated
versions are issued about monthly.
Search keys (including virus name or alias, family attribution, code
size, type and other characteristics) can be used to construct a
profile about any specified virus. The reports generated selectively
include:
- a summary description of the effects of infection
- disinfection methods
- the efficacy of some popular anti-viral software
- a detailed report on the characteristics of the virus(es)
The user interface is presently being re-designed to give greater
flexibility for the introduction of new features. Constructive comment
about the utility of PCVI or the direction of its future development
are always welcome.
Ian Leitch
London School of Hygiene and Tropical Medicine
JANET: uqak940@uk.ac.ulcc.mvs
------------------------------
Date: Wed, 15 May 91 11:47:10 -0500
From: "A. Andrew Brennan" <BRENNAAA@DUVM.BITNET>
Subject: Self-extracting archives
I'm not entirely sure, but with some (.ZIP) sfx archives, can't
you specify "-v" to get the list w/o extracting and "xxx.xxx" to
extract only one file? I think that I have used this technique
with PKZ110.EXE - I only wanted the ZIP and UNZIP executables.
Not entirely sure though - I haven't checked this yet.
A. Andrew Brennan
{you don't know me from Adam - but he didn't have a belly button ... }
------------------------------
Date: Wed, 15 May 91 09:02:56
From: <smith_s@gc.bitnet> (Steven W. Smith)
Subject: "protection" from research viruses
>From: "David.M.Chess" <CHESS@YKTVMV.BITNET>
>Subject: re: The Shape of the World (PC)
>>
>>This loud cry for protection against research-only viruses is quite
>>quite bothersome -- the numbers game we have to play (as a vendor) in
>>order to counter "my scanner can beat up your scanner" type of games
>>is sorta foolish -- yet we must play the game.
>
>Must we? Or rather, given that we must at the moment, must we always?
>Is there any hope that the anti-virus community might band together
>(for a moment, at least!) and decide that the numbers game shall be
>played ONLY with viruses that have appeared in reliably-confirmed
>real-world incidents? ...
For now, if it's really bothering you, I've got what seems a
reasonable solution: use Frisk's F-Prot (or any other package you like
that has an external list of nasties) and edit the SIGN.TXT file to
remove those signatures that you deem ridiculous.
Simple, no? Granted, it's no solution to the authors of antiviral
software, but from the user perspective it works.
_,_/|
\o.O; Steven W. Smith, Programmer/Analyst
=(___)= Glendale Community College, Glendale Az. USA
U SMITH_S@GC.BITNET
*poof* My opinions are now your opinions, so you'd better get used to it!
------------------------------
Date: Wed, 15 May 91 10:53:14 -0600
From: rtravsky@CORRAL.UWyo.Edu (Richard W Travsky)
Subject: New Name For FPROT (PC)
"Argus"... I like it. Gee, I hope it doesn't mean an increase in the
price ;)
Richard Travsky
Division of Information Technology RTRAVSKY @ CORRAL.UWYO.EDU
University of Wyoming (307) 766 - 3663 / 3668
------------------------------
End of VIRUS-L Digest [Volume 4 Issue 83]
*****************************************