Release Notes for McAfee(R) VirusScan(R) for UNIX Version 5.1.00 Copyright (C) 1992-2006 McAfee, Inc. All Rights Reserved ===================================================== - DAT Version: 4777 - Engine Version: 5100 ===================================================== Thank you for using VirusScan(R) for UNIX software. This file contains important information regarding this release. We strongly recommend that you read the entire document. Please ensure that you update the DAT files on your computer to the latest version. IMPORTANT: McAfee does not support automatic upgrading of a pre-release version of the software. To upgrade to a production release of the software, you must first uninstall the existing version of the software. __________________________________________________________ WHAT'S IN THIS FILE - New Features - System Requirements - Installation - List of Files - Removing the Software by a Script - Removing the Software Yourself - Known Issues - Documentation - Engine End-of-Life (EOL) Program - The Problem - The Solution - The Engine End-Of-Life Program - Participating in the McAfee Beta Program - Copyright & Trademark Attributions - License & Patent Information _____________________________________________________ NEW FEATURES - More protection : Automatic identification and removal of viruses delivering the next generation of best-of-breed anti-virus scanning engines. It offers improved protection against existing, new and potential threats and increases the depth and breadth of the protection we provide. - It's faster than before : We've listened to our customers who asked for a faster Engine and it delivers superior performance to current McAfee Anti-Virus products on all supported platforms. - Support for many more packed-executable formats in which known malware is often re-packaged for obfuscation purposes. __________________________________________________________ SYSTEM REQUIREMENTS The following requirements are mandatory for installing this software on any supported platform: - The current version of the UNIX operating system that you require must be installed and running correctly before you install the software. - At least 10 MB of free hard disk space. - At least 64 MB of RAM. 128 MB is recommended. - Root account permissions in order to install the software and perform an on-demand scan of your file system. The software runs with these UNIX operating systems: - IBM AIX 4.3.3, 5.1, 5.2, and 5.3 for RS6000 with the latest Maintenance Packages installed. - FreeBSD 4.3 to 4.11 for Intel (x86) 32-bit with legacy compatibility library libc.so.3 installed. - Hewlett-Packard HP-UX 11.0 and 11i for PA-RISC with the latest Standard HP-UX patch bundles installed. Note: HP-UX 11i v2 (11.23) is not supported. - Linux for Intel 32-bit distributions shipping with 2.4 and 2.6 production kernels, libc6 (glibc), gcc versions 3.2 onwards, and with libstdc++.so.5 installed. This distribution is optimised for Pentium 4 but is fully compatible with all Intel Pentium-compatible processors. - Sun Microsystems Solaris for SPARC versions 8 and 9 (32 and 64-bit) with the latest Solaris OS Recommended Cluster installed. __________________________________________________________ INSTALLATION 1. Download the appropriate distribution package for your UNIX system into a temporary directory on your computer. The distributions for evaluation or licenced versions, listed according to their operating systems, are: AIX vaix510e.tar.Z FreeBSD vbsd510e.tar.Z HP-UX vhpx510e.tar.Z Linux vlp4510e.tar.Z Solaris vsun510e.tar.Z AIX vaix510l.tar.Z FreeBSD vbsd510l.tar.Z HP-UX vhpx510l.tar.Z Linux vlp4510l.tar.Z Solaris vsun510l.tar.Z 2. Change to the directory where you downloaded your distribution package, then enter this command at the command prompt: zcat | tar -xf - Here, is the complete file name of the package you downloaded. Do not type the angled brackets. 3. Enter this line at the command prompt: ./install-uvscan Here, is the target directory where you want to install the software. Do not type the angled brackets shown in the example. If you do not specify an installation directory, the software is installed in /usr/local/uvscan. If the target installation directory that you specify does not exist, the program asks whether you want to create it. NOTE: To create an installation directory for the software, you must have the necessary WRITE and EXECUTE permissions. As the installation continues, the script asks whether you want to create symbolic links to the uvscan binary, the shared library and man pages. We recommend that you create the default links shown. 4. If you do not create the default links or use a standard directory, you will need to set an environment variable to the installation directory that you specified. The environment variables, listed according to their operating systems are: AIX LIBPATH FreeBSD LD_LIBRARY_PATH HP-UX SHLIB_PATH Linux LD_LIBRARY_PATH Sun Solaris LD_LIBRARY_PATH LIST OF FILES The type of files that are installed in the installation directory differ according to the distribution you choose. The following files reside in the installation directory of each distribution of the software. uninstall-uvscan Uninstallation file uvscan Executable file uvscan_secure Script, uses --secure option clean.dat Virus definition file names.dat Virus definition file scan.dat Virus definition file license.dat License file messages.dat Messages file e5100upg.pdf Product Guide contact.txt Contact information license.txt License information readme.txt This file signlic.txt Third-party license information uvscan.1 On-line help, 'man' pages The installation adds one of the following library files to the installation directory, according to the distribution that you choose: AIX libaixfv.a FreeBSD libbsdfv.so.4 HP-UX libhpxfv.4 Linux (Intel) liblnxfv.so.4 Sun Solaris libsunfv.so.4 and one of the following symbolic links to the library, where this is required: AIX (not applicable) FreeBSD libbsdfv.so HP-UX libhpxfv.sl Linux (Intel) liblnxfv.so Sun Solaris libsunfv.so REMOVING THE SOFTWARE To remove the software by a script: 1. Go to the directory where you installed the software and type this line at the command prompt to start the uninstallation script: ./uninstall-uvscan 2. Follow the instructions and respond to any prompts shown in the script to remove the program files from your computer. 3. Delete the script, uninstall-uvscan. NOTE: If you created any symbolic links when you installed the software, you must delete those yourself to completely remove the software from your computer. To remove the software manually: 1. Go to the directory where you installed the software. 2. Use the rm command to remove all the program files in that directory. If you created any symbolic links when you installed the software, you must delete those yourself to completely remove the software from your computer. NOTE: To see a list of the program files for each UNIX distribution, see "List of Files" earlier in this file. __________________________________________________________ KNOWN ISSUES 1. Some mail clients (such as PINE, Eudora, Netscape, and Pegasus Mail) use a file structure similar to concatenated MIME as their mailbox format. Scanning these mailboxes with mime detection enabled may produce unexpected errors (e.g. scanner reports files could not be opened). To avoid this, we recommend that either these files are excluded from scans, or the --mailbox switch is used in conjunction with --mime. __________________________________________________________ DOCUMENTATION Documentation is included on the product CD and/or is available with a valid grant number from the McAfee download site: https://secure.nai.com/us/forms/downloads/upgrades/login.asp NOTE: Electronic copies of all product manuals are saved as Adobe Acrobat .PDF files. The product CD includes the latest version of Acrobat Reader, or you can download any version from the Adobe web site: www.adobe.com/prodindex/acrobat/readstep.html This product includes the following documentation set: - Product Guide. Introduces the product, describes product features, provides detailed instructions for configuring the software, deployment, and ongoing operation and maintenance. - Help system. A Help file (‘man’ pages), accessed from within the software application, provides quick descriptions of the options. - A LICENSE Agreement. The terms under which you may use the product. Read it carefully. If you install the product, you agree to the license terms. - This README file. - A CONTACT file. Contact information for McAfee services and resources: technical support, customer service, AVERT, beta program, and training. It also includes a list of phone numbers, street addresses, web addresses, e-mail addresses, and fax numbers for the company's worldwide offices. __________________________________________________________ ENGINE END-OF-LIFE (EOL) PROGRAM Important information from AVERT and the McAfee Engine Development Team: Is your engine up-to-date? - Anti-virus is only as good as its last update! - Updating your DAT files regularly is essential and a MUST! - Updating your engine is just as important and a MUST. - An old engine WILL NOT catch some of today’s threats. - Sometimes architectural changes to the way that the DAT files and virus-scanning engine work together make it critical for you to update your engine. AVERT says it makes sense to have as part of your Security Policy Program, an Engine Update process to take advantage of the latest technology and stay protected! THE PROBLEM Between 250 and 400 new detections are added to the DAT files monthly by AVERT. If you are not up-to-date, you are vulnerable to any one of them that gets a foothold in the field (also known as "in the wild"). McAfee AVERT(TM) releases regular DAT files, ensuring that full protection is added to all McAfee products. The DAT files contain the information required to detect and remove threats - what to look for and where to look for it. However, today’s threats are evolving almost on a daily basis. Software providers continue to make changes to operating systems and applications that can change the way a program acts or works, and a virus-scanning program may not understand the changes. THE SOLUTION Taking this into account, McAfee regularly updates its virus-scanning engine used by ALL McAfee virus-detection and removal products. The engine understands all the different structures in which a virus could lurk - EXE files, Microsoft Office files, Linux files, and so on. Occasionally these changes require us to make significant architectural changes to the engine as well as the DAT files. AVERT strongly recommends that users of ALL McAfee anti-virus products update the engines in the products they have deployed as part of a sound security best-practices program. To check your engine version, right-click the McAfee shield in the system tray, select "About" and look at the "Scan engine" version number. If you need to update, you should update your scan engine immediately from our download site. THE ENGINE END-OF-LIFE PROGRAM Because of the evolving malicious code threat, users should update their engines as soon as possible upon the release of McAfee’s latest scanning technology. When a new engine is released, the existing engine will begin its countdown to its end of life, and will therefore no longer be supported by McAfee. Information on the McAfee Engine End-of-Life policy and a full list of supported engines and products can be found at: http://www.mcafee.com/us/enterprise/support/customer_service/end_life.html __________________________________________________________ PARTICIPATING IN THE MCAFEE BETA PROGRAM To download new beta software or to read about the latest beta information, visit the McAfee beta web site located at: http://www.mcafee.com/us/enterprise/downloads/beta/index.html To submit beta feedback on any McAfee product, send e-mail to: mcafee_beta@mcafee.com McAfee is devoted to providing solutions based on your input. __________________________________________________________ CONTACT INFORMATION THREAT CENTER: McAfee Avert(R) Labs Homepage http://www.mcafee.com/us/threat_center/default.asp Avert Labs Threat Library http://vil.nai.com/ Avert Labs WebImmune & Submit a Sample (Logon credentials required) https://www.webimmune.net/default.asp Avert Labs DAT Notification Service http://vil.nai.com/vil/signup_DAT_notification.aspx DOWNLOAD SITE Homepage http://www.mcafee.com/us/downloads/ - Product Upgrades (Valid grant number required) - Security Updates (DATs, engine) - HotFix and Patch Releases - For Security Vulnerabilities (Available to the public) - For Products (ServicePortal account and valid grant number required) - Product Evaluation - McAfee Beta Program TECHNICAL SUPPORT Homepage http://www.mcafee.com/us/support KnowledgeBase Search http://knowledge.mcafee.com/ McAfee Technical Support ServicePortal (Logon credentials required) https://mysupport.mcafee.com/eservice_enu/start.swe CUSTOMER SERVICE Web: http://www.mcafee.com/us/support/index.html http://www.mcafee.com/us/about/contact/index.html Phone: +1-888-VIRUS NO or +1-888-847-8766 Monday-Friday, 8 a.m.-8 p.m., Central Time US, Canada, and Latin America toll-free PROFESSIONAL SERVICES - Enterprise: http://www.mcafee.com/us/enterprise/services/index.html - Small & Medium Business: http://www.mcafee.com/us/smb/services/index.html _____________________________________________________ COPYRIGHT AND TRADEMARK ATTRIBUTIONS Copyright (C) 2006 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies. TRADEMARKS ACTIVE FIREWALL, ACTIVE SECURITY, ACTIVESECURITY (AND IN KATAKANA), ACTIVESHIELD, CLEAN-UP, DESIGN (STYLIZED E), DESIGN (STYLIZED N), ENTERCEPT, EPOLICY ORCHESTRATOR, FIRST AID, FOUNDSTONE, GROUPSHIELD, GROUPSHIELD (AND IN KATAKANA), INTRUSHIELD, INTRUSION PREVENTION THROUGH INNOVATION, MCAFEE, MCAFEE (AND IN KATAKANA), MCAFEE AND DESIGN, MCAFEE.COM, MCAFEE VIRUSSCAN, NET TOOLS, NET TOOLS (AND IN KATAKANA), NETSCAN, NETSHIELD, NUTS & BOLTS, OIL CHANGE, PRIMESUPPORT, SPAMKILLER, THREATSCAN, TOTAL VIRUS DEFENSE, VIREX, VIRUS FORUM, VIRUSCAN, VIRUSSCAN, VIRUSSCAN (AND IN KATAKANA), WEBSCAN, WEBSHIELD, WEBSHIELD (AND IN KATAKANA) are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. The color red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners. _____________________________________________________ LICENSE & PATENT INFORMATION LICENSE AGREEMENT NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. LICENSE ATTRIBUTIONS This product includes or may include: * Software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/). * Cryptographic software written by Eric A. Young and software written by Tim J. Hudson. * Some software programs that are licensed (or sublicensed) to the user under the GNU General Public License (GPL) or other similar Free Software licenses which, among other rights, permit the user to copy, modify and redistribute certain programs, or portions thereof, and have access to the source code. The GPL requires that for any software covered under the GPL, which is distributed to someone in an executable binary format, that the source code also be made available to those users. For any such software covered under the GPL, the source code is made available on this CD. If any Free Software licenses require that McAfee provide rights to use, copy or modify a software program that are broader than the rights granted in this agreement, then such rights shall take precedence over the rights and restrictions herein. * Software originally written by Henry Spencer, Copyright 1992, 1993, 1994, 1997 Henry Spencer. * Software originally written by Robert Nordier, Copyright (C) 1996-7 Robert Nordier. * Software written by Douglas W. Sauder. * Software developed by the Apache Software Foundation (http://www.apache.org/). A copy of the license agreement for this software can be found at www.apache.org/licenses/LICENSE-2.0.txt. * International Components for Unicode ("ICU") Copyright (C) 1995-2002 International Business Machines Corporation and others. * Software developed by CrystalClear Software, Inc., Copyright (C) 2000 CrystalClear Software, Inc. * FEAD(R) Optimizer(R) technology, Copyright Netopsystems AG, Berlin, Germany. * Outside In(R) Viewer Technology (C) 1992-2001 Stellent Chicago, Inc. and/or Outside In(R) HTML Export, (C) 2001 Stellent Chicago, Inc. * Software copyrighted by Thai Open Source Software Center Ltd. and Clark Cooper, (C) 1998, 1999, 2000. * Software copyrighted by Expat maintainers. * Software copyrighted by The Regents of the University of California, (C) 1996, 1989, 1998-2000. * Software copyrighted by Gunnar Ritter. * Software copyrighted by Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054, U.S.A., (C) 2003. * Software copyrighted by Gisle Aas. (C) 1995-2003. * Software copyrighted by Michael A. Chase, (C) 1999-2000. * Software copyrighted by Neil Winton, (C) 1995-1996. * Software copyrighted by RSA Data Security, Inc., (C) 1990-1992. * Software copyrighted by Sean M. Burke, (C) 1999, 2000. * Software copyrighted by Martijn Koster, (C) 1995. * Software copyrighted by Brad Appleton, (C) 1996-1999. * Software copyrighted by Michael G. Schwern, (C) 2001. * Software copyrighted by Graham Barr, (C) 1998. * Software copyrighted by Larry Wall and Clark Cooper, (C) 1998-2000. * Software copyrighted by Frodo Looijaard, (C) 1997. * Software copyrighted by the Python Software Foundation, Copyright (C) 2001, 2002, 2003. A copy of the license agreement for this software can be found at www.python.org. * Software copyrighted by Beman Dawes, (C) 1994-1999, 2002. * Software written by Andrew Lumsdaine, Lie-Quan Lee, Jeremy G. Siek (C) 1997-2000 University of Notre Dame. * Software copyrighted by Simone Bordet & Marco Cravero, (C) 2002. * Software copyrighted by Stephen Purcell, (C) 2001. * Software developed by the Indiana University Extreme! Lab (http://www.extreme.indiana.edu/). * Software copyrighted by International Business Machines Corporation and others, (C) 1995-2003. * Software developed by the University of California, Berkeley and its contributors. * Software developed by Ralf S. Engelschall for use in the mod_ssl project (http:// www.modssl.org/). * Software copyrighted by Kevlin Henney, (C) 2000-2002. * Software copyrighted by Peter Dimov and Multi Media Ltd. (C) 2001, 2002. * Software copyrighted by David Abrahams, (C) 2001, 2002. See http://www.boost.org/libs/bind/bind.html for documentation. * Software copyrighted by Steve Cleary, Beman Dawes, Howard Hinnant & John Maddock, (C) 2000. * Software copyrighted by Boost.org, (C) 1999-2002. * Software copyrighted by Nicolai M. Josuttis, (C) 1999. * Software copyrighted by Jeremy Siek, (C) 1999-2001. * Software copyrighted by Daryle Walker, (C) 2001. * Software copyrighted by Chuck Allison and Jeremy Siek, (C) 2001, 2002. * Software copyrighted by Samuel Krempp, (C) 2001. See http://www.boost.org for updates, documentation, and revision history. * Software copyrighted by Doug Gregor (gregod@cs.rpi.edu), (C) 2001, 2002. * Software copyrighted by Cadenza New Zealand Ltd., (C) 2000. * Software copyrighted by Jens Maurer, (C) 2000, 2001. * Software copyrighted by Jaakko Järvi (jaakko.jarvi@cs.utu.fi), (C) 1999, 2000. * Software copyrighted by Ronald Garcia, (C) 2002. * Software copyrighted by David Abrahams, Jeremy Siek, and Daryle Walker, (C) 1999-2001. * Software copyrighted by Stephen Cleary (shammah@voyager.net), (C) 2000. * Software copyrighted by Housemarque Oy , (C) 2001. * Software copyrighted by Paul Moore, (C) 1999. * Software copyrighted by Dr. John Maddock, (C) 1998-2002. * Software copyrighted by Greg Colvin and Beman Dawes, (C) 1998, 1999. * Software copyrighted by Peter Dimov, (C) 2001, 2002. * Software copyrighted by Jeremy Siek and John R. Bandela, (C) 2001. * Software copyrighted by Joerg Walter and Mathias Koch, (C) 2000-2002. * Software copyrighted by Carnegie Mellon University (C) 1989, 1991, 1992. * Software copyrighted by Cambridge Broadband Ltd., (C) 2001-2003. * Software copyrighted by Sparta, Inc., (C) 2003-2004. * Software copyrighted by Cisco, Inc and Information Network Center of Beijing University of Posts and Telecommunications, (C) 2004. * Software copyrighted by Simon Josefsson, (C) 2003. * Software copyrighted by Thomas Jacob, (C) 2003-2004. * Software copyrighted by Advanced Software Engineering Limited, (C) 2004. * Software copyrighted by Todd C. Miller, (C) 1998. * Software copyrighted by The Regents of the University of California, (C) 1990, 1993, with code derived from software contributed to Berkeley by Chris Torek. PATENTS Protected by US Patents 6,029,256; 6,496,875; 6,668,289. DBN 003-EN Deriv. V3.1.4