Risk

11/14/2008
06:04 PM
50%
50%

Anti-Virus Vendor Makes Amends For PC-Breaking Snafu

The problem started Nov. 9 when AVG released a virus signature update that misidentified the user32.dll file, a core Windows XP file, as a Trojan.

AVG Technologies is offering free antivirus services for a year to customers caught in a software snafu that left their PCs unbootable.

The problem started Nov. 9 when AVG released a virus signature update that misidentified the user32.dll file, a core Windows XP file, as a Trojan, causing the company's antivirus software to ask the user whether to delete the file. Those who answered yes found that their machines either wouldn't boot or would go into an endless reboot cycle. AVG released a fix within hours after the snafu was discovered, but not soon enough to prevent damage to some customers' computers.

As a result, the company said it would offer affected users of AVG 7.5 a one-year license for the equivalent 8.0 upgrade at no charge. Users of AVG 8.0 can get a free one-year license extension, and people using AVG's popular free antivirus software can get a one-year license to the commercial version at no charge.

The company plans to start contacting affected customers Nov. 24 to tell them how they can obtain their freebies.

"AVG Technologies apologizes again for the inconvenience caused to our customers and wishes to assure our users worldwide that the company is actively putting new processes in place to avoid similar occurrences in the future," the company said in a statement issued late Thursday.

The incident was not the first time AVG, based in the Czech Republic, has released virus signatures with a false positive. The company's software less than a month ago misidentified Check Point's ZoneAlarm as a Trojan, according to the U.K. tech site the Register.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
quickbookshelp
50%
50%
quickbookshelp,
User Rank: Apprentice
6/5/2018 | 6:52:54 PM
Hp printer support
Antiviruses is a software which prevents pcs from outsiders malware viruses etc. To know more visit Hp printer support.
Microsoft Fixes 11 Critical, 39 Important Vulns
Kelly Sheridan, Staff Editor, Dark Reading,  6/12/2018
Why CISOs Need a Security Reality Check
Joel Fulton, Chief Information Security Officer for Splunk,  6/13/2018
Cisco Talos Summit: Network Defenders Not Serious Enough About Attacks
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/13/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12580
PUBLISHED: 2018-06-19
library/DBTech/Security/Action/Sessions.php in DragonByte vBSecurity 3.x through 3.3.0 for vBulletin 3 and vBulletin 4 allows self-XSS via $session['user_agent'] in the "Login Sessions" feature.
CVE-2018-12578
PUBLISHED: 2018-06-19
There is a heap-based buffer overflow in bmp_compress1_row in appliers.cpp in sam2p 0.49.4 that leads to a denial of service or possibly unspecified other impact.
CVE-2018-1061
PUBLISHED: 2018-06-19
python before versions 2.7.15, 3.4.9, 3.5.6 and 3.7.0 is vulnerable to catastrophic backtracking in the difflib.IS_LINE_JUNK method. An attacker could use this flaw to cause denial of service.
CVE-2018-1073
PUBLISHED: 2018-06-19
The web console login form in ovirt-engine before version 4.2.3 returned different errors for non-existent users and invalid passwords, allowing an attacker to discover the names of valid user accounts.
CVE-2018-12557
PUBLISHED: 2018-06-19
An issue was discovered in Zuul 3.x before 3.1.0. If nodes become offline during the build, the no_log attribute of a task is ignored. If the unreachable error occurred in a task used with a loop variable (e.g., with_items), the contents of the loop items would be printed in the console. This could ...