About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Hacker Zines
CERT
CHAL
CHAOS
CIAC
CPD
CPSR
CRH
CWD
CuD
CuD/A
EFF
LOL
MOD
Miscellaneous Phreak and Hacker Zines
NIA
RISKS
UXU
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

CIAC Advisory number A- 17


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.

FOR OFFICIAL DOE USE ONLY
________________________________________________________________________
THE COMPUTER INCIDENT ADVISORY CAPABILITY

CIAC

INFORMATION BULLETIN
________________________________________________________________________

Eradicating WDEF using Disinfectant 1.5 or 1.6

February 2, 1989, 1400 PST Number A-17

CIAC Information Bulletin A-9 reported the existence of the WDEF virus
on Macintosh computers. The purpose of this bulletin is to provide
additional information about eradicating this virus.

Disinfectant 1.5 and the most recent version, Disinfectant 1.6, are
capable of detecting and eradicating WDEF, but are not designed to
prevent the spread of WDEF during its execution. If an infected disk
is inserted into the Macintosh while Disinfectant is running (for the
purposes of eradicating WDEF), WDEF will infect ANY OTHER UNLOCKED
MOUNTED VOLUMES. If Disinfectant is to be used to eradicate a WDEF
infection, CIAC recommends the following procedure:

1. Prepare a system disk using locked originals. Use the
instructions provided with the Macintosh documentation if you require
assistance in preparing this system disk. If possible, you should not
use your hard disk to prepare this system disk. Copy Disinfectant
version 1.5 or version 1.6 to this disk. Lock the disk and shut down
the system.

2. Reboot the Macintosh using the prepared system disk.
Launch disinfectant off the floppy and use the SCAN function to check
your hard disk for the WDEF virus. If found, use the DISINFECT
function to remove WDEF from your hard disk. Quit disinfectant.

3. Reboot the Macintosh using this prepared system disk.
You should drag any hard disks that automatically appear on the
desktop to the trash to unmount them. Launch the copy of Disinfectant
on the system disk. Use the SCAN facility of Disinfectant to verify
that WDEF has not infected this system disk. If it has, you will have
to eject the system disk, unlock it, and insert it again. Use the
DISINFECT function of Disinfectant to eradicate WDEF. Next, you
should eject the system disk and lock it again. Reinsert the system
disk.

4. Use Disinfectant to scan all of your floppy disks.
WDEF will infect both system and non-system disks; to completely
eradicate WDEF you will have to disinfect all of your disks (including
backup disks). DO NOT USE YOUR HARD DRIVE DURING THIS PROCEDURE.

5. Once all of your floppy disks are disinfected, reboot
your system using the locked system disk. Now run Disinfectant and
disinfect your hard disk. Once WDEF has been eradicated from all
floppies and your hard disk, the eradication procedure is complete.

The most recent versions of other tools such as SAM, VIREX,
GATEKEEPER, and GATEKEEPER AID may also be used to eradicate or
prevent the spread of the WDEF virus. If you have questions
concerning these tools, contact CIAC for assistance.

For further information, or for a copy of Disinfectant 1.6, please
contact CIAC:

Tom Longstaff
(415) 423-4416 or (FTS) 543-4416
FAX: (415) 294-5054

CIAC's business hours phone number is (415) 422-8193 or (FTS)
532-8193. CIAC's 24-hour emergency hot-line number is (415)
971-9384. If you call the emergency number and there is no answer,
please let the number ring until voice mail comes on. Please leave a
voice mail message; someone will return your call promptly. You may
also send e-mail to:

[email protected]

Neither the United States Government nor the University of California
nor any of their employees, makes any warranty, expressed or implied,
or assumes any legal liability or responsibility for the accuracy,
completeness, or usefulness of any information, product, or process
disclosed, or represents that its use would not infringe privately
owned rights. Reference herein to any specific commercial products,
process, or service by trade name, trademark manufacturer, or
otherwise, does not necessarily constitute or imply its endorsement,
recommendation, or favoring by the United States Government or the
University of California. The views and opinions of authors expressed
herein do not necessarily state or reflect those of the United States
Government nor the University of California, and shall not be used for
advertising or product endorsement purposes.

CIAC BULLETINS ISSUED

SUN 386i authentication bypass vulnerability
nVIR virus alert
/dev/mem vulnerability
tftp/rwalld vulnerability
"Little Black Box" (Jerusalem) virus alert
restore/dump vulnerability
rcp/rdist vulnerability
Internet trojan horse alert
NCSA Telnet vulnerability
Internet hacker alert
Columbus Day (DataCrime) virus alert
Columbus Day (DataCrime) virus alert (follow-up, notice A-1)
HEPnet/SPAN network worm alert (notice A-2)
HEPnet/SPAN network worm alert (follow-up, notice A-3)
HEPnet/SPAN network worm alert (follow-up, notice A-4)
rcp vulnerability (second vulnerability, notice A-5)
Trojan horse in Norton Utilities (notice A-6)
UNICOS vulnerability (classified, limited distribution, notice A-7)
UNICOS problem (limited distribution, notice A-8)
WDEF virus alert (notice A-9)
PC CYBORG (AIDS) trojan horse alert (notice A-10)
Problem in the Texas Instruments D3 Process Control System (notice A-11)
DECnet hacker attack alert (notice A-12)
Vulnerability in DECODE alias (notice A-13)
Additional information on the vulnerability in the UNIX DECODE alias
(notice A-14)
Virus information update (notice A-15)
Vulnerability in SUN sendmail program (notice A-16)
Eradicating WDEF using Disinfectant 1.5 or 1.6 (notice A-17)



 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
R. A. Salvatore
Reading childrens books weird?
What are you currently reading?
How often do you read?
Would you let your novel become a movie?
Penguin and Barnes and Noble, fleecing customer?
Chuck Palahniuk
What does reading mean for you?
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS