|   | CIAC Advisory number A- 17NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
 
 FOR OFFICIAL DOE USE ONLY
 ________________________________________________________________________
 THE COMPUTER INCIDENT ADVISORY CAPABILITY
 
 CIAC
 
 INFORMATION    BULLETIN
 ________________________________________________________________________
 
 Eradicating WDEF using Disinfectant 1.5 or 1.6
 
 February 2, 1989, 1400 PST                             	     Number A-17
 
 CIAC Information Bulletin A-9 reported the existence of the WDEF virus
 on Macintosh computers.  The purpose of this bulletin is to provide
 additional information about eradicating this virus.
 
 Disinfectant 1.5 and the most recent version, Disinfectant 1.6, are
 capable of detecting and eradicating WDEF, but are not designed to
 prevent the spread of WDEF during its execution.  If an infected disk
 is inserted into the Macintosh while Disinfectant is running (for the
 purposes of eradicating WDEF), WDEF will infect ANY OTHER UNLOCKED
 MOUNTED VOLUMES.  If Disinfectant is to be used to eradicate a WDEF
 infection, CIAC recommends the following procedure:
 
 1.	Prepare a system disk using locked originals.  Use the
 instructions provided with the Macintosh documentation if you require
 assistance in preparing this system disk.  If possible, you should not
 use your hard disk to prepare this system disk.  Copy Disinfectant
 version 1.5 or version 1.6 to this disk.  Lock the disk and shut down
 the system.
 
 2.	Reboot the Macintosh using the prepared system disk.
 Launch disinfectant off the floppy and use the SCAN function to check
 your hard disk for the WDEF virus.  If found, use the DISINFECT
 function to remove WDEF from your hard disk.  Quit disinfectant.
 
 3.	Reboot the Macintosh using this prepared system disk.
 You should drag any hard disks that automatically appear on the
 desktop to the trash to unmount them.  Launch the copy of Disinfectant
 on the system disk.  Use the SCAN facility of Disinfectant to verify
 that WDEF has not infected this system disk.  If it has, you will have
 to eject the system disk, unlock it, and insert it again.  Use the
 DISINFECT function of Disinfectant to eradicate WDEF.  Next, you
 should eject the system disk and lock it again.  Reinsert the system
 disk.
 
 4.	Use Disinfectant to scan all of your floppy disks.
 WDEF will infect both system and non-system disks; to completely
 eradicate WDEF you will have to disinfect all of your disks (including
 backup disks).  DO NOT USE YOUR HARD DRIVE DURING THIS PROCEDURE.
 
 5.	Once all of your floppy disks are disinfected, reboot
 your system using the locked system disk.  Now run Disinfectant and
 disinfect your hard disk.  Once WDEF has been eradicated from all
 floppies and your hard disk, the eradication procedure is complete.
 
 The most recent versions of other tools such as SAM, VIREX,
 GATEKEEPER, and GATEKEEPER AID may also be used to eradicate or
 prevent the spread of the WDEF virus.  If you have questions
 concerning these tools, contact CIAC for assistance.
 
 For further information, or for a copy of Disinfectant 1.6, please
 contact CIAC:
 
 Tom Longstaff
 (415) 423-4416 or (FTS) 543-4416
 FAX: (415) 294-5054
 
 CIAC's business hours phone number is (415) 422-8193 or (FTS)
 532-8193.  CIAC's 24-hour emergency hot-line number is (415)
 971-9384.  If you call the emergency number and there is no answer,
 please let the number ring until voice mail comes on.  Please leave a
 voice mail message; someone will return your call promptly.  You may
 also send e-mail to:
 
 [email protected]
 
 Neither the United States Government nor the University of California
 nor any of their employees, makes any warranty, expressed or implied,
 or assumes any legal liability or responsibility for the accuracy,
 completeness, or usefulness of any information, product, or process
 disclosed, or represents that its use would not infringe privately
 owned rights.  Reference herein to any specific commercial products,
 process, or service by trade name, trademark manufacturer, or
 otherwise, does not necessarily constitute or imply its endorsement,
 recommendation, or favoring by the United States Government or the
 University of California.  The views and opinions of authors expressed
 herein do not necessarily state or reflect those of the United States
 Government nor the University of California, and shall not be used for
 advertising or product endorsement purposes.
 
 CIAC BULLETINS ISSUED
 
 SUN 386i authentication bypass vulnerability
 nVIR virus alert
 /dev/mem vulnerability
 tftp/rwalld vulnerability
 "Little Black Box" (Jerusalem) virus alert
 restore/dump vulnerability
 rcp/rdist vulnerability
 Internet trojan horse alert
 NCSA Telnet vulnerability
 Internet hacker alert
 Columbus Day (DataCrime) virus alert
 Columbus Day (DataCrime) virus alert (follow-up, notice A-1)
 HEPnet/SPAN network worm alert (notice A-2)
 HEPnet/SPAN network worm alert (follow-up, notice A-3)
 HEPnet/SPAN network worm alert (follow-up, notice A-4)
 rcp vulnerability (second vulnerability, notice A-5)
 Trojan horse in Norton Utilities (notice A-6)
 UNICOS vulnerability (classified, limited distribution, notice A-7)
 UNICOS problem (limited distribution, notice A-8)
 WDEF virus alert (notice A-9)
 PC CYBORG (AIDS) trojan horse alert (notice A-10)
 Problem in the Texas Instruments D3 Process Control System  (notice A-11)
 DECnet hacker attack alert (notice A-12)
 Vulnerability in DECODE alias (notice A-13)
 Additional information on the vulnerability in the UNIX DECODE alias
 (notice A-14)
 Virus information update (notice A-15)
 Vulnerability in SUN sendmail program (notice A-16)
 Eradicating WDEF using Disinfectant 1.5 or 1.6 (notice A-17)
 
 
 
 
 |   |