Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Malware :: nav5.htm

Norton Antivirus Corporate Edition 7.01 problems with "I Love You"



Vulnerability

    NAV with Exchange

Affected

    Norton Antivirus Corporate Edition 7.01

Description

    Emmett Keyser found following.  His Exchange server has  performed
    relatively well  in the  past 6  months.   Coinciding with the ILY
    outbreak our  Exchange's Information  Store began  to die sometime
    during  the  night  -  not  exactly  at  the same time each night.
    Conversations  with   Exchange  tech   support  result   in  this:
    Microsoft's unofficial stance regarding AV software is to not  run
    it on Exchange servers  - even if it's  Exchange aware.  They  are
    apparently  having  quite   a  few  problems   with  AV   software
    renaming/deleting/setting  attributes  on  transaction  log files.
    The  symptom  is  that  the  Information  Store  is being shutdown
    non-gracefully.  A IS restart  results in all kinds of  errors but
    boils down to  the fact that  there is a  missing/corrupt log file
    to  bring  the  database  back  to  a  consistent state.  Circular
    logging is disabled.   Backups are Exchange  aware but also  don't
    occur within the time frame of the IS dying.

Solution

    Bad  things  can  happen  to  MS  Exchange  when  NAV-NT   detects
    LoveLetter.   We have  discovered that  the Exchange  file EDB.LOG
    can  contain  recognizable  LoveLetter   code,  and  if   deleted,
    "repaired" or quarantined  will take MSE  down hard.   All Desktop
    NAVs  (NAV-NT,  NAV-CE/NT,  NAV2000)  must  be  configured so that
    AutoProtect  excludes  the  Temp  directory  used  by  MSE and the
    Exchange   database   directories.     This   is   discussed    in
    KBdoc#2000050509410706   "Norton   AntiVirus   for   NT    detects
    VBS.Loveletter.worm on Exchange server".

    Be sure to  use this KB  to track all  relevant cases.   This is a
    direct result of setting AutoProtect to "ScanAllFiles", and was an
    unfortunate trade-off  of using  ScanAllFiles as  a recommended or
    default setting.

    A  similar  problem  exists  with  Eudora,  where IN.MBX (the file
    Eudora stores all  inbox email in)  can be quarantined  or deleted
    by NAV desktop, specifically when  KAK.Worm is detected.  This  is
    a major reason why NAV needs  to determine type by header and  not
    by extension.

    So, to protect  an Exchange Server  itself from getting  infected,
    don't install a mail client on  it, and never try to open  mail on
    it in any fashion.   Same for a SQL  server, but it's pretty  hard
    for a  virus to  invade a  SQL database.   If you  want to install
    software  to  assure  that  an  infected email doesn't invade your
    server, then use an AV product specifically designed for  Exchange
    Server  and  DO  NOT  allow  any  portion  of  it to scan files or
    memory.  If  you have to  scan files, stop  all Exchange Services,
    exclude  the  /exchsrvr  directories,  run  a  scan, disable to AV
    software and start the server back up.

    With the  information provided  by Emmett,  Symantec has performed
    extensive  testing  of  NAV  Corporate  Edition 7.01 for NT Server
    running  with   MS  Exchange   for  NT   simulating  hundreds   of
    connections.  Symantec recommends  configuring NAV CE not  to scan
    directories containing MSE temp files or the Exchange database.


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH