home *** CD-ROM | disk | FTP | other *** search
-
-
- _____________________________________________________
-
- The Computer Incident Advisory Capability
-
- ___ __ __ _ ___
-
- / | / \ /
-
- \___ __|__ /___\ \___
-
- _____________________________________________________
-
- Informational Bulletin
-
-
-
- Virus Propagation in Novelle and Other Networks
-
-
-
- September 21, 1990, 1000 PST Number A-33
-
-
-
- Problem: Virus propagation on write-protected file systems
-
- Types: Many known viruses, most frequently variants of the Jerusalem
-
- (Israeli) virus
-
- Platform: MS-DOS computers
-
- Damage: Files that use software write-protection schemes cannot be
-
- assumed safe from damage due to virus infection
-
- Symptoms: Virus infection on write-protected files
-
- Detection: VIRHUNT, RESSCAN, CodeSafe, Vi-Spy, IBM Scan, FPROT
-
- Eradication: VIRHUNT, CodeSafe, FPROT, and others (see text in p. 2 of
-
- this bulletin for recommended procedures)
-
-
-
- Critical Virus Propagation Facts
-
-
-
-
-
- This bulletin is to warn of a virus threat to networks for MS-DOS
-
- systems. File servers (e.g., Novell file servers) use attribute bits
-
- to perform write protection on files stored on server machines. Many
-
- viruses will clear these attribute protection bits before they attempt
-
- infection, thus circumventing the write protection scheme. Thus,
-
- write-protecting a program does not guarantee that the file is not
-
- infected with the virus.
-
-
-
- The following is a common scenario reported to CIAC: a floppy infected
-
- with the Jerusalem-B virus is inserted into a user's PC attached to a
-
- Novell network. Once this virus is executed, it resides in the PC's
-
- memory. When the user attempts to logon to the file server (running
-
- the program login.exe), the virus infects this program, even though the
-
- program is write-protected. Login.exe is a shared program that is
-
- executed by each user as s/he connects to the Novell network. Thus,
-
- each time a user logs in to the network, his/her machine immediately
-
- becomes infected with the Jerusalem-B virus. The network allows the
-
- Jerusalem-B virus to spread considerably more quickly than if it had
-
- spread through exchange of floppy disks.
-
-
-
- When someone disinfects a system of PCs or PC clones on a Novell or
-
- similar file system, CIAC recommends the following procedures:
-
-
-
- 1) Detect the virus using one of the recommended packages for
-
- detecting and identifying the virus. Determine exactly which virus has
-
- infected the system, and that all virus types have been detected.
-
- Contact CIAC if you need assistance.
-
-
-
- 2) Deactivate the network connecting the PCs/PC clones together.
-
- This includes shutting down the file servers and unmounting the
-
- partitions from the users' PCs/PC clones.
-
-
-
- 3) Disinfect the server machines using an anti-virus package known
-
- to be effective against the detected virus. Alternately, reformat the
-
- server disks and re-install the system from original diskettes, then
-
- restore the data files from a recent backup. Do not attempt to restore
-
- programs (i.e., executable files) from a backup, as this is likely to
-
- reinfect your system.
-
-
-
- 4) Disinfect each user's PC/PC clone using the same procedure as
-
- in step 2.
-
-
-
- 5) Verify that the virus does not reside on the file server or any
-
- user's PC/PC clone.
-
-
-
- 6) Bring the network file system back up.
-
-
-
- For additional information or assistance, please contact CIAC:
-
-
-
- Tom Longstaff
-
- (415) 423-4416 or (FTS) 543-4416
-
- FAX: (415) 423-0913 or (FTS) 543-0913
-
-
-
- Send e-mail to:
-
-
-
- ciac@tiger.llnl.gov
-
-
-
- Neither the United States Government nor the University of California
-
- nor any of their employees, makes any warranty, expressed or implied,
-
- or assumes any legal liability or responsibility for the accuracy,
-
- completeness, or usefulness of any information, product, or process
-
- disclosed, or represents that its use would not infringe privately
-
- owned rights. Reference herein to any specific commercial products,
-
- process, or service by trade name, trademark manufacturer, or
-
- otherwise, does not necessarily constitute or imply its endorsement,
-
- recommendation, or favoring by the United States Government or the
-
- University of California. The views and opinions of authors expressed
-
- herein do not necessarily state or reflect those of the United States
-
- Government nor the University of California, and shall not be used for
-
- advertising or product endorsement purposes.
-
-