Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Bug Software Windows IT

Kaspersky Update Breaks Internet Access For Windows XP Users 92

An anonymous reader writes "Yesterday afternoon, Kaspersky Labs released a definition update that blocked all Internet and Intranet access on Windows XP workstations. While there has been no official communication from Kaspersky, their forum is lit up with angry customers relying on each other to find a fix." Update: 02/05 16:42 GMT by T : Thanks to an anonymous reader, who says that Kaspersky has issued a statement, and a fix (though the fix takes some manual labor to implement).
This discussion has been archived. No new comments can be posted.

Kaspersky Update Breaks Internet Access For Windows XP Users

Comments Filter:
  • by UnknownSoldier ( 67820 ) on Tuesday February 05, 2013 @12:41PM (#42797871)

    You may laugh, but originally that was the only way for Windows NT to get C2 certification. :-)

    * http://support.microsoft.com/kb/93362 [microsoft.com]
    " Microsoft has opted not to include certain components of Windows NT in the evaluation process, ... It may be enough to consider networking to be another subsystem, ... "

  • by Alioth ( 221270 ) <no@spam> on Tuesday February 05, 2013 @12:42PM (#42797883) Journal

    I have to wonder at which point workstation AV software becomes a bigger risk than the actual malware.

    So far in our organization, we've had two AV incidents. One several years ago when a user brought in an infected laptop with one of the Microsoft RPC exploiting worms. We got the worm before the AV vendor (Symantec at the time) had a signature for it, so the AV software was totally useless. The other event was when Symantec erroneously flagged a Windows Server 2003 resource kit program as malware and quarantined it (fortunately, a program we didn't rely on). So so far, for us - AV has failed to catch our only malware infection and has broken a non-infected program. Strict filtering (both inbound AND outbound) has done a lot more to stop malware in our organization than AV software ever has.

    I also remember an incident a few years ago when a prominent AV vendor's software (I think it was Norton) erroneously quarantined a system file in the Chinese version of WinXP, and rendered the workstation unbootable, affecting a very large number of users.

    I also wonder if any of the AV companies have independently verified and verifiable procedures for making their updates; a malicious employee at one of the big AV vendors could cause a lot of damage by releasing an update that results in an important system file getting quarantined. What safeguards do each AV vendor have in place to prevent this happening? How is it verified that the companies are actually carrying out the policies if they have them to ensure updates are not malicious, and how is it verified that these policies are actually watertight?

  • by andywest ( 1722392 ) on Tuesday February 05, 2013 @12:59PM (#42798131) Homepage
    This is not Kaspersky's only problem with its anti-virus product. I have been asked to install a 'technical update'. When I did so, it crashed the anti-virus so badly that it no longer worked at all. I had to physically remove its folder from the Program Files area and reinstall the program from scratch. And this was with Windows 7. That was back in November. When I got the same message in January, I thought Kaspersky might have fixed the problem. Nope: Install -- crash -- scrape up mess -- reinstall from scratch. You kind of wonder what has Kaspersky been doing over the past six months.

1 Mole = 007 Secret Agents