AVG bad update bricks Win7 64-bit
FYI...
AVG bad update bricks Win7 64-bit
- http://isc.sans.edu/diary.html?storyid=10030
Last Updated: 2010-12-03 04:24:55 UTC - "... reports on AVG updates breaking things on Windows 7 64 bit... The problem lies with the mandatory update. The AVG site has some info on how to deal with the issue here http://forums.avg.com/ww-en/avg-free...=show&id=94159
* Basically get the machine started somehow (use AVG rescue Disk or any Linux Live CD). In the windows/system32/drivers directory rename everything starting with avg. Reboot and your system will be back (minus the AV). I guess it will then be a matter of waiting for it to be fixed, reinstall or change to something else."
___
AVG fix for computers running on Windows 7 64-bit platform - updated
- http://product-team.blog.avg.com/201...-platform.html
12/02/2010 - "... we have identified a potential conflict between one of our recent updates (3292) and a significant number of systems running on the Windows 7 64-bit platform that has caused systems to go into an infinite crash loop... video to help you solve this problem..."
- http://forums.avg.com/ww-en/avg-free...99#post_132999
[Read -entire- thread]
System crash after the recent AVG 2011 update 3292 (BSOD)
- http://free.avg.com/ww-en/faq?num=4080
- http://www.avg.com/us-en/faq?num=4079
Updated AVG 2011 Rescue CD/USB (for 3292 update)
- http://www.youtube.com/watch?v=Fam3-KSfA3A
___
- http://forums.avg.com/us-en/avg-free...show&id=132917
- http://www.youtube.com/watch?v=x4hfiY55bkQ
:sad::confused::scratch:
F-secure: false positive...
FYI...
F-secure: false positive...
- http://www.f-secure.com/weblog/archives/00002073.html
December 10, 2010 07:22 GMT - "Unfortunately we had a nasty false alarm couple of hours ago. The false alarm involved the detection Adware.smartad.d, which was in the database update 2010-12-09_10, released on 9th Dec 2236 UTC. This detection inadvertently triggered on the file google-analytics.com/ga.js. This file is a script associated with Google Analytics, and it's found on a fair number of websites. An exclusion for the file was released in the database update 2010-12-10_01 at 10th Dec 0052 UTC - about 2.5 hours after the bad update went out.
Apologies for any disruptions caused by this false alarm. We're sorry. To minimize disruptions, please make sure your product has been updated to use the latest database updates."
:fear::sad:
F-Secure remote binary vuln - updates available
FYI...
F-Secure remote binary vuln - updates available
- http://secunia.com/advisories/42566/
Release Date: 2010-12-15
Criticality level: Highly critical
Impact: System access
Where: From remote
Solution Status: Vendor Patch
Solution: Apply patches. Patches are also distributed via the automatic update channel.
Original Advisory: F-Secure Security Advisory FSC-2010-4:
http://www.f-secure.com/en_EMEA/supp...sc-2010-4.html
Last updated: 2010-12-15
Risk level: High
Brief description: Under certain circumstances, an attacker can trick the system into executing a binary file that has been planted on a disk resource that the computer can access... Administrators should download and apply the hotfixes listed...
- http://www.securitytracker.com/id?1024895
Dec 15 2010
:fear::fear: