[<prev] [next>] [day] [month] [year] [list]
Message-ID: <C887EDB390C0E74781D4B54156A9544A05719A0D@deexmail01.de.trendnet.org>
Date: Sat Apr 23 15:21:34 2005
From: Martin_Roesler at trendmicro-europe.com (Martin_Roesler@...ndmicro-europe.com)
Subject: Possible Virus activity
Hello everybody
First of all I have to apologize on behalf of Trend Micro.
I understand that you faced severe problems due to a significant
performance issue on PC's that have loaded the pattern file 2.594.00
Manual Solution:
To fix this problem, please follow the solution #24263 (Office Scan) and
#24264 (PC-cillin Internet Security Suite)
http://kb.trendmicro.com/solutions/search/main/search/solutionDetail.asp
?solutionId=24263
http://kb.trendmicro.com/solutions/search/main/search/solutionDetail.asp
?solutionId=24264
Explanation:
On April 22, 2005, starting at 3:33 pm Pacific (10:33 GMT) Trend Micro
posted a pattern file (2.594.00) that had the potential to interact with
certain computing configurations and cause computer performance issues
for some users. This specific pattern file was only available during a
1 hour and 29 minute time window. Trend Micro removed the pattern file
from our Web sites and Active Update servers at 5:02 pm (1:02 GMT), and
immediately took steps to post a new pattern file. Subsequent pattern
file downloads do not cause these issues.
Right now Trend Micro global support team is working to fully understand
the extent of the problem and provide additional solutions.
Trend Micro has extended support hours especially to help those
customers who had this special intersection of circumstances and were
affected by this issue. Trend Micro is continuing testing in order to
fully understand initial assessments and fix the issue, and endeavor to
provide additional information as it becomes available.
Martin Roesler
Director of Global Technical Support Operations
Trend Micro Deutschland GmbH
Lise-Meitner-Str. 4
85716 Unterschleissheim
E-Mail: Martin_Roesler@...ndmicro-europe.com
__________________________________________________
http://www.trendmicro-europe.com
-----Original Message-----
From: full-disclosure-bounces@...ts.grok.org.uk
[mailto:full-disclosure-bounces@...ts.grok.org.uk] On Behalf Of Benjamin
Krueger
Sent: Samstag, 23. April 2005 05:14
To: Jonathan Grotegut
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: [Full-disclosure] Possible Virus activity
* Jonathan Grotegut (jgrotegut@...ectpointe.com) [050422 19:30]:
> One of the things one of our techs has found is it is somehow related
to Trend Office Scan, one of our techs killed all the services on one of
the computer he could, he started them up one by one. Once he started
Trend Officescan service the System process spiked. Possible update
today on Trend that botched it?
>
> Jonathan Grotegut
http://kb.trendmicro.com/solutions/search/main/search/SolutionDetail.asp
?SolutionID=24263&btnSearch=GO
"Windows XP Service Pack 2 machines with critical patches and OfficeScan
Corporate Edition (OSCE) starts to experience high CPU utilization after
updating to Pattern 594"
594 was released today, and then 596 was released immediately
afterwards. It looks like the machines having problems on my network are
running 594 and weren't able to successfully update to 596. Coincidence?
I think not.
Thanks Trend. You've ruined my Friday night. My girlfriend and I thank
you...
--
Benjamin Krueger
"Nakedness is sinful. If God wanted us to go naked, we would have been
born that way."
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
TREND MICRO EMAIL NOTICE
The information contained in this email and any attachments is confidential and may be subject to copyright or other intellectual property protection. If you are not the intended recipient, you are not authorized to use or disclose this information, and we request that you notify us by reply mail or telephone and delete the original message from your mail system.
Powered by blists - more mailing lists