home *** CD-ROM | disk | FTP | other *** search
- ________________________________________________________________________
-
- THE COMPUTER INCIDENT ADVISORY CAPABILITY
-
-
-
- CIAC
-
-
-
- INFORMATION BULLETIN
-
- ________________________________________________________________________
-
-
-
- Eradicating WDEF using Disinfectant 1.5 or 1.6
-
-
-
- February 2, 1989, 1400 PST Number A-17
-
-
-
-
-
- CIAC Information Bulletin A-9 reported the existence of the WDEF virus
-
- on Macintosh computers. The purpose of this bulletin is to provide
-
- additional information about eradicating this virus.
-
-
-
- Disinfectant 1.5 and the most recent version, Disinfectant 1.6, are
-
- capable of detecting and eradicating WDEF, but are not designed to
-
- prevent the spread of WDEF during its execution. If an infected disk
-
- is inserted into the Macintosh while Disinfectant is running (for the
-
- purposes of eradicating WDEF), WDEF will infect ANY OTHER UNLOCKED
-
- MOUNTED VOLUMES. If Disinfectant is to be used to eradicate a WDEF
-
- infection, CIAC recommends the following procedure:
-
-
-
- 1. Prepare a system disk using locked originals. Use the
-
- instructions provided with the Macintosh documentation if you require
-
- assistance in preparing this system disk. If possible, you should not
-
- use your hard disk to prepare this system disk. Copy Disinfectant
-
- version 1.5 or version 1.6 to this disk. Lock the disk and shut down
-
- the system.
-
-
-
- 2. Reboot the Macintosh using the prepared system disk.
-
- Launch disinfectant off the floppy and use the SCAN function to check
-
- your hard disk for the WDEF virus. If found, use the DISINFECT
-
- function to remove WDEF from your hard disk. Quit disinfectant.
-
-
-
- 3. Reboot the Macintosh using this prepared system disk.
-
- You should drag any hard disks that automatically appear on the
-
- desktop to the trash to unmount them. Launch the copy of Disinfectant
-
- on the system disk. Use the SCAN facility of Disinfectant to verify
-
- that WDEF has not infected this system disk. If it has, you will have
-
- to eject the system disk, unlock it, and insert it again. Use the
-
- DISINFECT function of Disinfectant to eradicate WDEF. Next, you
-
- should eject the system disk and lock it again. Reinsert the system
-
- disk.
-
-
-
- 4. Use Disinfectant to scan all of your floppy disks.
-
- WDEF will infect both system and non-system disks; to completely
-
- eradicate WDEF you will have to disinfect all of your disks (including
-
- backup disks). DO NOT USE YOUR HARD DRIVE DURING THIS PROCEDURE.
-
-
-
- 5. Once all of your floppy disks are disinfected, reboot
-
- your system using the locked system disk. Now run Disinfectant and
-
- disinfect your hard disk. Once WDEF has been eradicated from all
-
- floppies and your hard disk, the eradication procedure is complete.
-
-
-
-
-
- The most recent versions of other tools such as SAM, VIREX,
-
- GATEKEEPER, and GATEKEEPER AID may also be used to eradicate or
-
- prevent the spread of the WDEF virus. If you have questions
-
- concerning these tools, contact CIAC for assistance.
-
-
-
- For further information, or for a copy of Disinfectant 1.6, please
-
- contact CIAC:
-
-
-
- Tom Longstaff
-
- (415) 423-4416 or (FTS) 543-4416
-
- FAX: (415) 294-5054
-
-
-
- CIAC's business hours phone number is (415) 422-8193 or (FTS)
-
- 532-8193. CIAC's 24-hour emergency hot-line number is (415)
-
- 971-9384. If you call the emergency number and there is no answer,
-
- please let the number ring until voice mail comes on. Please leave a
-
- voice mail message; someone will return your call promptly. You may
-
- also send e-mail to:
-
-
-
- ciac@tiger.llnl.gov
-
-
-
- Neither the United States Government nor the University of California
-
- nor any of their employees, makes any warranty, expressed or implied,
-
- or assumes any legal liability or responsibility for the accuracy,
-
- completeness, or usefulness of any information, product, or process
-
- disclosed, or represents that its use would not infringe privately
-
- owned rights. Reference herein to any specific commercial products,
-
- process, or service by trade name, trademark manufacturer, or
-
- otherwise, does not necessarily constitute or imply its endorsement,
-
- recommendation, or favoring by the United States Government or the
-
- University of California. The views and opinions of authors expressed
-
- herein do not necessarily state or reflect those of the United States
-
- Government nor the University of California, and shall not be used for
-
- advertising or product endorsement purposes.
-
-
-
- CIAC BULLETINS ISSUED
-
-
-
- SUN 386i authentication bypass vulnerability
-
- nVIR virus alert
-
- /dev/mem vulnerability
-
- tftp/rwalld vulnerability
-
- "Little Black Box" (Jerusalem) virus alert
-
- restore/dump vulnerability
-
- rcp/rdist vulnerability
-
- Internet trojan horse alert
-
- NCSA Telnet vulnerability
-
- Internet hacker alert
-
- Columbus Day (DataCrime) virus alert
-
- Columbus Day (DataCrime) virus alert (follow-up, notice A-1)
-
- HEPnet/SPAN network worm alert (notice A-2)
-
- HEPnet/SPAN network worm alert (follow-up, notice A-3)
-
- HEPnet/SPAN network worm alert (follow-up, notice A-4)
-
- rcp vulnerability (second vulnerability, notice A-5)
-
- Trojan horse in Norton Utilities (notice A-6)
-
- UNICOS vulnerability (classified, limited distribution, notice A-7)
-
- UNICOS problem (limited distribution, notice A-8)
-
- WDEF virus alert (notice A-9)
-
- PC CYBORG (AIDS) trojan horse alert (notice A-10)
-
- Problem in the Texas Instruments D3 Process Control System (notice A-11)
-
- DECnet hacker attack alert (notice A-12)
-
- Vulnerability in DECODE alias (notice A-13)
-
- Additional information on the vulnerability in the UNIX DECODE alias
-
- (notice A-14)
-
- Virus information update (notice A-15)
-
- Vulnerability in SUN sendmail program (notice A-16)
-
- Eradicating WDEF using Disinfectant 1.5 or 1.6 (notice A-17)
-
-
-
-
-
-
-
-
-
-