Release Notes for McAfee(R) VirusScan(R) for UNIX Version 4.3.20 Copyright (C) 1992-2003 Networks Associates Technology, Inc. All Rights Reserved ===================================================== - DAT Version: 4307 - Engine Version: 4320 ===================================================== Thank you for using VirusScan(R) for UNIX software. This file contains important information regarding this release. We strongly recommend that you read the entire document. This release of the software functions ONLY with 4297 and later DATs. You CANNOT use this software with earlier DAT versions. IMPORTANT: McAfee Security does not support automatic upgrading of a pre-release version of the software. To upgrade to a production release of the software, you must first uninstall the existing version of the software. _____________________________________________________ WHAT'S IN THIS FILE - New Features - System Requirements - Installation - Testing Your Installation - Removing the Software by a Script - Removing the Software Yourself - Program Files Installed - Known Issues - Documentation - Participating in the McAfee Security Beta Program - Contacting McAfee Security & Network Associates - Copyright and Trademark Attributions - Trademarks - License Agreement and Attributions _____________________________________________________ NEW FEATURES - Support for Microsoft Office 2003 XML documents - Improved support for RAR formats - Updated support for latest .ZIP file formats - Improved support for corrupt .ZIP files _____________________________________________________ SYSTEM REQUIREMENTS The following requirements are mandatory for installing this software on any supported platform: - The current version of the UNIX operating system that you require must be installed and running correctly before you install the software. - At least 10MB of free hard disk space. - Root account permissions in order to install the software and perform an on-demand scan of your file system. The software runs with these UNIX operating systems: - AIX 4.2.1, 4.3.x, and AIX 5.0L, with all recommended patches installed. - FreeBSD 3.2 and 4.3 for Intel (32-bit). - Hewlett-Packard HP-UX 10.20, 11.x and HP-UX 11i, with all recommended patches installed. - Linux for Intel (32-bit) 2.0, 2.2 and 2.4 production kernels with libc6 (glibc) and the stdc++ library version 2.8, as present in older Linux distributions. The forthcoming 2.6 kernel is not supported at this time. - Linux for Intel (32-bit) 2.0, 2.2 and 2.4 production kernels with libc6 (glibc) and the stdc++ library version 5, as present in newer Linux distributions, such as RedHat 9 and SuSE 8.2. The forthcoming 2.6 kernel is not supported at this time. The product has been optimised for Pentium 4 but is fully compatible with all Intel Pentium processors. - SuSE Linux 7.2 for IBM S/390. - Santa Cruz Operation (SCO) OpenServer Release 5 and SCO UnixWare 7.1.1 for Intel (32-bit). NOTE: SCO Openserver requires installation of the SCO UnixWare Binary Compatibility Module (BCM). - Sun Microsystems Solaris for SPARC architecture, versions 2.5.1, 2.6, 7, 8 and 9 with all recommended patches installed. ________________________________________________ INSTALLATION 1. Download the appropriate distribution package for your UNIX system into a temporary directory on your computer. The distributions, listed according to their operating systems, are, for licensed versions: AIX vaix432l.tar.Z FreeBSD vbsd432l.tar.Z HP-UX vhpx432l.tar.Z Linux(i86) vlnx432l.tar.Z Linux(i86/P4) vlnxp4432l.tar.Z Linux(S/390) vs390lnx432l.tar.Z SCO vsco432l.tar.Z Solaris vsun432l.tar.Z and, for evaluation or beta versions: AIX vaix432e.tar.Z FreeBSD vbsd432e.tar.Z HP-UX vhpx432e.tar.Z Linux (i86) vlnx432e.tar.Z Linux (i86/P4) vlnxp4432e.tar.Z Linux (S/390) vs390lnx432e.tar.Z SCO vsco432e.tar.Z Solaris vsun432e.tar.Z 2. Change to the directory where you downloaded your distribution package, then enter this command at the command prompt: zcat | tar -xf - Here, is the complete file name of the package you downloaded. Do not type the angled brackets. 3. Enter this line at the command prompt: ./install-uvscan Here, is the target directory where you want to install the software. Do not type the angled brackets shown in the example. If you do not specify an installation directory, the software is installed in /usr/local/uvscan. If the target installation directory that you specify does not exist, the program asks whether you want to create it. NOTE: To create an installation directory for the software, you must have the necessary WRITE and EXECUTE permissions. As the installation continues, the script asks whether you want to create symbolic links to the uvscan binary, the shared library and man pages. We recommend that you create the default links shown. 4. If you do not create the default links or use a standard directory, you will need to set an environment variable to the installation directory that you specified. See the next list. AIX LIBPATH FreeBSD LD_LIBRARY_PATH HP-UX SHLIB_PATH Linux LD_LIBRARY_PATH SCO OpenServer LD_LIBRARY_PATH Sun Solaris LD_LIBRARY_PATH TESTING YOUR INSTALLATION You can test the operation of the software by running the EICAR Standard AntiVirus Test File on any computer where you have installed the software. The EICAR Standard AntiVirus Test File is a combined effort by anti-virus vendors throughout the world to implement one standard by which customers can verify their anti-virus installations. To test your installation: 1. Copy the following line into its own file, then save the file with the name EICAR.COM. X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H* The file size will be 68 or 70 bytes. 2. Start your anti-virus software and allow it to scan the directory that contains EICAR.COM. When your software scans this file, it will report finding the EICAR test file. 3. Delete the file when you have finished testing your installation to avoid alarming unsuspecting users. IMPORTANT: Please note that this file is NOT A VIRUS. REMOVING THE SOFTWARE BY A SCRIPT 1. Go to the directory where you installed the software and type this line at the command prompt to start the uninstallation script: ./uninstall-uvscan 2. Follow the instructions and respond to any prompts shown in the script to remove the program files from your computer. NOTE: If you created any symbolic links when you installed the software, you must delete those yourself to completely remove the software from your computer. REMOVING THE SOFTWARE YOURSELF 1. Go to the directory where you installed the software. 2. Use the rm command to remove all the program files in that directory. If you created any symbolic links when you installed the software, you must delete those yourself to completely remove the software from your computer. NOTE: To see a list of the program files for each UNIX distribution, see "Program Files Installed" next in this file. PROGRAM FILES INSTALLED The type of files that are installed in the installation directory differ according to the distribution you choose. The following files reside in the installation directory of each distribution of the software. uninstall-uvscan Uninstallation file uvscan Executable file uvscan_secure Script, uses --secure option clean.dat Virus definition file names.dat Virus definition file scan.dat Virus definition file license.dat License file messages.dat Messages file contact.txt Contact information e4320upg.pdf Product Guide license.txt License information readme.txt This file signlic.txt Third-party license information uvscan.1 On-line help, 'man' pages The installation adds one of the following library files to the installation directory: AIX libaixfv.a FreeBSD libbsdfv.so.4 HP-UX libhpxfv.4 Linux (Intel) liblnxfv.so.4 Linux (S/390) libs390fv.so.4 SCO OpenServer libscofv.so.4 Sun Solaris libsunfv.so.4 and one of the following symbolic links to the library, where this is required: AIX Not applicable FreeBSD libbsdfv.so HP-UX libhpxfv.sl Linux (Intel) liblnxfv.so Linux (S/390) libs390fv.so SCO OpenServer libscofv.so Sun Solaris libsunfv.so _____________________________________________________ KNOWN ISSUES 1. Some mail clients (such as PINE, Eudora, Netscape, and Pegasus Mail) use a file structure similar to concatenated MIME as their mailbox format. Scanning these mailboxes with mime detection enabled may produce unexpected errors (e.g. scanner reports files could not be opened). To avoid this, we recommend that either these files are excluded from scans, or the --mailbox switch is used in conjunction with --mime. _____________________________________________________ DOCUMENTATION Documentation is included on the product CD and/or is available with a valid grant number from the McAfee Security download site: https://secure.nai.com/us/forms/downloads/upgrades/login.asp NOTE: Electronic copies of all product manuals are saved as Adobe Acrobat .PDF files. The product CD includes the latest version of Acrobat Reader, or you can download any version from the Adobe web site: www.adobe.com/prodindex/acrobat/readstep.html - Product Guide. Introduces the product, describes product features, provides detailed instructions for configuring the software, deployment, and ongoing operation and maintenance. - Help system. A Help file (‘man’ pages), accessed from within the software application, provides quick descriptions of the options. - A LICENSE Agreement. The terms under which you may use the product. Read it carefully. If you install the product, you agree to the license terms. - This README file. - A CONTACT file. Contact information for McAfee Security and Network Associates services and resources: technical support, customer service, AVERT, beta program, and training. It also includes a list of phone numbers, street addresses, web addresses, e-mail addresses, and fax numbers for Network Associates offices in the United States and around the world. _____________________________________________________ PARTICIPATING IN THE MCAFEE SECURITY BETA PROGRAM To download new beta software or to read about the latest beta information, visit the beta web site: http://www.networkassociates.com/us/downloads/beta/ To submit your feedback on any McAfee Security beta product, send e-mail to: avbeta@nai.com McAfee Security is devoted to providing solutions based on your input. __________________________________________________________ CONTACTING MCAFEE SECURITY & NETWORK ASSOCIATES Technical Support Home Page http://www.networkassociates.com/us/support/ KnowledgeBase Search https://knowledgemap.nai.com/phpclient/homepage.aspx PrimeSupport Service Portal http://mysupport.nai.com Login credentials required. McAfee Security Beta Program Beta Web Site http://www.networkassociates.com/us/downloads/beta/ E-mail avbeta@nai.com Security Headquarters -- AVERT (Anti-Virus Emergency Response Team) Home Page http://www.networkassociates.com/us/security/home.asp Virus Information Library http://vil.nai.com Submit a Virus Sample – AVERT WebImmune https://www.webimmune.net/default.asp AVERT DAT Notification Service http://vil.nai.com/vil/join-DAT-list.asp Download Site Home Page http://www.networkassociates.com/us/downloads/ DAT File and Engine Updates http://www.networkassociates.com/us/downloads/updates/ ftp://ftp.nai.com/pub/antivirus/datfiles/4.x Product Upgrades https://secure.nai.com/us/forms/downloads/upgrades/login.asp Valid grant number required. Contact Network Associates Customer Service Training McAfee Security University http://www.networkassociates.com/us/services/education/mcafee/university.htm Network Associates Customer Service US, Canada, and Latin America toll-free: Phone: +1-888-VIRUS NO or +1-888-847-8766 Monday - Friday, 8 a.m. - 8 p.m., Central Time E-mail: services_corporate_division@nai.com Web: http://www.nai.com/us/index.asp http://www.networkassociates.com/us/index.asp For additional information on contacting Network Associates and McAfee Security – including toll-free numbers for other geographic areas -- see the CONTACT file that accompanied your original product release. __________________________________________________________ COPYRIGHT AND TRADEMARK ATTRIBUTIONS Copyright (C) 2003 Networks Associates Technology, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of Networks Associates Technology, Inc., or its suppliers or affiliate companies. To obtain this permission, write to the attention of the Network Associates legal department at: 5000 Headquarters Drive, Plano, Texas 75024, or call +1-972- 963-8000. TRADEMARKS Active Firewall, Active Security, Active Security (in Katakana), ActiveHelp, ActiveShield, AntiVirus Anyware and design, Appera, AVERT, Bomb Shelter, Certified Network Expert, Clean-Up, CleanUp Wizard, ClickNet, CNX, CNX Certification Certified Network Expert and design, Covert, Design (stylized N), Disk Minder, Distributed Sniffer System, Distributed Sniffer System (in Katakana), Dr Solomon’s, Dr Solomon’s label, E and Design, Entercept, Enterprise SecureCast, Enterprise SecureCast (in Katakana), ePolicy Orchestrator, Event Orchestrator (in Katakana), EZ SetUp, First Aid, ForceField, GMT, GroupShield, GroupShield (in Katakana), Guard Dog, HelpDesk, HelpDesk IQ, HomeGuard, Hunter, Impermia, InfiniStream, Intrusion Prevention Through Innovation, IntruShield, IntruVert Networks, LANGuru, LANGuru (in Katakana), M and design, Magic Solutions, Magic Solutions (in Katakana), Magic University, MagicSpy, MagicTree, McAfee, McAfee (in Katakana), McAfee and design, McAfee.com, MultiMedia Cloaking, NA Network Associates, Net Tools, Net Tools (in Katakana), NetAsyst, NetCrypto, NetOctopus, NetScan, NetShield, NetStalker, Network Associates, Network Performance Orchestrator, NetXray, NotesGuard, nPO, Nuts & Bolts, Oil Change, PC Medic, PCNotary, PortalShield, Powered by SpamAssassin, PrimeSupport, Recoverkey, Recoverkey – International, Registry Wizard, Remote Desktop, ReportMagic, RingFence, Router PM, Safe & Sound, SalesMagic, SecureCast, SecureSelect, SecurityShield, Service Level Manager, ServiceMagic, SmartDesk, Sniffer, Sniffer (in Hangul), SpamKiller, SpamAssassin, Stalker, SupportMagic, ThreatScan, TIS, TMEG, Total Network Security, Total Network Visibility, Total Network Visibility (in Katakana), Total Service Desk, Total Virus Defense, Trusted Mail, UnInstaller, VIDS, Virex, Virus Forum, ViruScan, VirusScan, WebScan, WebShield, WebShield (in Katakana), WebSniffer, WebStalker, WebWall, What's The State Of Your IDS?, Who’s Watching Your Network, WinGauge, Your E-Business Defender, ZAC 2000, Zip Manager are registered trademarks or trademarks of Network Associates, Inc. and/or its affiliates in the US and/or other countries. Sniffer(R) brand products are made only by Network Associates, Inc. All other registered and unregistered trademarks herein are the sole property of their respective owners. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEB SITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO NETWORK ASSOCIATES, INC. OR THE PLACE OF PURCHASE FOR A FULL REFUND. Attributions This product includes or may include: - Software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/). - Cryptographic software written by Eric Young and software written by Tim J. Hudson. - Some software programs that are licensed (or sublicensed) to the user under the GNU General Public License (GPL) or other similar Free Software licenses which, among other rights, permit the user to copy, modify and redistribute certain programs, or portions thereof, and have access to the source code. The GPL requires that for any software covered under the GPL which is distributed to someone in an executable binary format, that the source code also be made available to those users. For any such software covered under the GPL, the source code is made available on this CD. If any Free Software licenses require that Network Associates provide rights to use, copy or modify a software program that are broader than the rights granted in this agreement, then such rights shall take precedence over the rights and restrictions herein. - Software originally written by Henry Spencer, Copyright 1992, 1993, 1994, 1997 Henry Spencer. - Software originally written by Robert Nordier, Copyright (C) 1996-7 Robert Nordier. All rights reserved. - Software written by Douglas W. Sauder. - Software developed by the Apache Software Foundation (http://www.apache.org/). - International Components for Unicode ("ICU") Copyright (C) 1995-2002 International Business Machines Corporation and others. All rights reserved. - Software developed by CrystalClear Software, Inc., Copyright (C) 2000 CrystalClear Software, Inc. - FEAD(R) Optimizer(R) technology, Copyright Netopsystems AG, Berlin, Germany. - Outside In(R) Viewer Technology (C) 1992-2001 Stellent Chicago, Inc. and/or Outside In(R) HTML Export, (C) 2001 Stellent Chicago, Inc. - Software copyrighted by Thai Open Source Software Center Ltd. and Clark Cooper, (C) 1998, 1999, 2000. - Software copyrighted by Expat maintainers. - Software copyrighted by The Regents of the University of California, (C) 1989. - Software copyrighted by Gunnar Ritter. - Software copyrighted by Sun Microsystems(C), Inc. - Software copyrighted by Gisle Aas. All rights reserved, (C) 1995-2003. - Software copyrighted by Michael A. Chase, (C) 1999-2000. - Software copyrighted by Neil Winton, (C) 1995-1996. - Software copyrighted by RSA Data Security, Inc., (C) 1990-1992. - Software copyrighted by Sean M. Burke, (C) 1999, 2000. - Software copyrighted by Martijn Koster, (C) 1995. - Software copyrighted by Brad Appleton, (C) 1996-1999. - Software copyrighted by Michael G. Schwern, (C) 2001. - Software copyrighted by Graham Barr, (C) 1998. - Software copyrighted by Larry Wall and Clark Cooper, (C) 1998-2000. - Software copyrighted by Frodo Looijaard, (C) 1997. V2.3.1 DBN 322-EN