 Release Notes for McAfee(R) VirusScan(R) Enterprise
                    Version 8.0i
                      Patch 10
           Copyright (C) 2005 McAfee, Inc.
                 All Rights Reserved


==========================================================

Patch Release:    14 January 2005

This release was developed and tested with:

- VirusScan Enterprise:8.0i
- DAT Version:         4416, December 22 2004
- Engine Version:      4.3.20

Make sure you have installed these versions before
using this release.

==========================================================


Thank you for using VirusScan(R) Enterprise
software. This file contains important information
regarding this release. We strongly recommend that
you read the entire document.


The attached files are provided as is, and with no
warranty either expressed or implied as to their
suitability for any particular use or purpose.
McAfee, Inc. assumes no liability for damages
incurred either directly or indirectly as a result
of the use of these files, including but not limited
to the loss or damage of data or systems, loss of
business or revenue, or incidental damages arising
from their use. Patch files should be applied only
on the advice of McAfee Technical Support, and only
when you are actually experiencing the issue being
addressed by the Patch. Patch files should not be
proactively applied in order to prevent potential
product issues. You are responsible for reading and
following all instructions for preparation,
configuration, and installation of Patch files.
Patch files are not a substitute or replacement for
product Service Packs which may be released by
McAfee, Inc. It is a violation of your software
license agreement to distribute or share these files
with any other person or entity without written
permission from McAfee, Inc. Further, posting of
McAfee Patch files to publicly available Internet
sites is prohibited. McAfee, Inc. reserves the right
to refuse distribution of Patch files to any company
or person guilty of unlawful distribution of McAfee
software products. Questions or issues with McAfee
Patch files should be directed to McAfee Technical
Support.



__________________________________________________________
WHAT'S IN THIS FILE

-   About This Release
   -   Purpose
   -   Resolved Issues
   -   Known Issues
   -   Files Included With This Release
-   Installation
   -   Installation Requirements
   -   Installation Steps
   -   Installation Steps via ePolicy Orchestrator
   -   Installation Steps via McAfee Installation
       Designer
-   Contact Information
-   Copyright & Trademark Attributions
-   License Information


__________________________________________________________
ABOUT THIS RELEASE


PURPOSE

This release combines previous patches and updated
binaries into a single Microsoft Patch installer to
address all items listed in "Resolved Issues"
below.


RESOLVED ISSUES

1.  ISSUE:
    A memory leak occurred in non-page pool memory
    when accessing files via the network redirector.
    The TDI driver did not release memory that had
    been allocated for identifying Source IP
    information.

    RESOLUTION:
    Memory is properly released by the TDI driver.

2.  ISSUE:
    If the TDI driver received an I/O Request Packet
    (IRP) that did not have enough stack locations
    to be passed down the stack, a new IRP was
    created and the original IRP was left
    uncompleted. This resulted in a small memory
    leak.

    RESOLUTION:
    The original IRP is now completed.

3.  ISSUE:
    A driver conflict between the McAfee TDI driver
    and a driver from Aventail VPN Client software
    could result in NetBIOS network connectivity
    being lost.

    RESOLUTION:
    NetBIOS network connectivity functions as
    expected when these applications are installed.

4.  ISSUE:
    When a system was under considerable file I/O
    stress, and the path information of a file was
    not examined correctly by the exclusion library,
    an excluded file or a file inside an excluded
    folder could be scanned.

    RESOLUTION:
    The exclusion library has been updated to ensure
    that file path information is examined correctly
    under any stress condition.

5.  ISSUE:
    Malformed JPEG files taking advantage of the
    MS04-028 exploit could be rendered by a browser
    - without first having to cache files locally
    -- to induce an attack on the system. Details of
    the security bulletin can be found at:

       http://www.microsoft.com/technet/security/bulletin/ms04-028.mspx

    RESOLUTION:
    The processes monitored by the Buffer Overflow
    Protection feature are protected against
    malicious code attempting to execute after
    exploiting the MS04-028 vulnerability.

    IMPORTANT:
    When a buffer overflow has occurred, the
    affected process may become unstable and may
    need to be restarted.

    This patch release is not a substitute for any
    security patch(es) provided by Microsoft to
    resolve the MS04-028 vulnerability.

6.  ISSUE:
    Toolbar icons in some applications, including
    IBM WebSphere Studio, display as black boxes.

    RESOLUTION:
    Toolbar icons now display as expected.

7.  ISSUE:
    Web Inspector from Zixcorp would encounter an
    error upon initializing, usually seen at logon.

    RESOLUTION:
    Web Inspector loads without issue.

8.  ISSUE:
    Windows Media Player 10 could stop responding
    after you select the option to listen to a
    "Radio" stream, then select the "Music" tab.

    RESOLUTION:
    Windows Media Player 10 operates correctly
    without interruption when you change from the
    "Radio" tab to "Music" tab, and vice versa.

    NOTE:
    Once the Patch is applied, a reboot may be
    required to resolve this issue.

9.  ISSUE:
    List boxes and Message boxes in .NET
    applications do not display any content.

    RESOLUTION:
    List boxes and Message boxes now display content
    as expected.

10. ISSUE:
    In some Notes configurations where user mail
    databases were located in varying locations, the
    Lotus Notes Scanner would not find a mailbox to
    scan.

    RESOLUTION:
    User mailboxes are correctly located, and the
    Lotus Notes scanner protects the database.

11. ISSUE:
    The user interface option that allows you to
    password protect the "On-Access Scanner:
    Detection" page mistakenly protects both the
    On-Access Scan "Detection" and On-Access Scan
    "Set Exclusions" property pages. A user could
    not add exclusions.

    RESOLUTION:
    Choosing to protect the "On-Access Scanner:
    Detection" page from the "User Interface
    Options" now protects only the On-Access Scan
    "Detection" page.

12. ISSUE:
    A "Cannot find the file specified" error message
    could occur when starting Lotus Notes via a
    shortcut, or when starting Lotus Notes from a
    shell.

    The same error message could occur when
    third-party applications that inject an add-in
    into Lotus Notes attempt to invoke the McAfee
    Lotus Notes scanner extensions and fail to find
    NCDAEMON.EXE.

    RESOLUTION:
    NCDAEMON.EXE now loads successfully.

13. ISSUE:
    A delay in responsiveness of the script engine
    would occur when executing scripts
    sequentially.

    RESOLUTION:
    Scripts terminate correctly, allowing the script
    engine to respond to subsequent script
    commands.

14. ISSUE:
    An "Access denied" error appeared in an
    application that used the "delete-on-close" flag
    when working with temporary files. The file
    system filter driver would lose track of the
    "delete-on-close" flag.

    RESOLUTION:
    The updated file system filter driver resolves
    this issue, allowing temporary files to be
    utilized as expected.


KNOWN ISSUES

1.  When installing locally, you may not be prompted
    to reboot after the installation. However, a
    reboot is necessary to unload the previous
    McAfee TDI filter driver and load the new
    driver.

2.  Performing a repair of the product via the
    Control Panel "Add/Remove Programs" applet and
    omitting to rewrite registry values, reinstalls
    both product and patch but will not report the
    patch is installed. For example, the "About"
    screen will not show Patch 10.

    Reinstall the product, or when doing the repair
    ensure the option to rewrite registry values is
    selected.

3.  Installing the patch and specifying a log file
    path using the MSI switch "/L" will not log to
    the specified path. A log capturing full data is
    logged to the folder "NAILogs" under the Temp
    folder.

4.  If you install Patch 10 after you have already
    installed the Anti-Spyware Enterprise Module,
    the module is removed. When installing Patch 10,
    be certain to install it before you install the
    Anti-Spyware Enterprise Module. If you have
    already installed the module, then install Patch
    10, you must re-install the module.


FILES INCLUDED WITH THIS RELEASE

This release consists of a package called
VSE80P10.ZIP, which contains the following files:

    PKGCATALOG.Z =
       Package catalog file
    PATCH10.TXT =
       This text file
    VS800DET.MCS =
       VirusScan Enterprise detection script
    PACKING.LST =
       Packing list
    PATCH10.MSP =
       Microsoft Installer Patch file
    SETUP.EXE =
       Installer for this release
    SETUP.INI =
       Initialization file for SETUP.EXE

__________________________________________________________
INSTALLATION


INSTALLATION REQUIREMENTS

To use this release, you must have VirusScan
Enterprise 8.0i software installed on the computer
you intend to update with this release.

    NOTE:
    This release does not work with earlier versions
    of VirusScan software.

    Patch 10 or later is required before installing
    the Anti-Spyware Enterprise Module.


INSTALLATION STEPS

1.  Extract the Patch files from VSE80P10.ZIP to a
    temporary folder on your hard drive.

2.  Double-click the file SETUP.EXE inside the
    temporary folder created in Step 1.

3.  Follow the instructions of the installation
    wizard.


INSTALLATION STEPS FOR ePOLICY ORCHESTRATOR

1.  On the computer where the ePolicy Orchestrator
    3.x console resides, extract the Patch files
    from VSE80P10.ZIP to a temporary folder on your
    hard drive.

2.  Open the ePolicy Orchestrator 3.x console and
    add the package from the temporary folder
    created in Step 1 to your repository.

    Consult "Checking in Package" on page 206 of the
    ePolicy Orchestrator 3.0 Product Guide for
    instructions on adding a package to the
    repository. The package type for this Patch is
    "Products or Updates."

The next time an agent update task runs, the
VirusScan Enterprise client automatically downloads
and installs the Patch.


INSTALLATION STEPS VIA MCAFEE INSTALLATION DESIGNER

1.  Extract the files from VSE80P10.ZIP to a
    temporary folder on your hard drive.

2.  Start McAfee Installation Designer 8.0, select
    "Create a new installation package," and select
    a source and destination folder for your
    installation package; then click "Next."

3.  Go to the "Patch Files" section and click "Add."
    Browse to the temporary folder you created in
    Step 1, and select the file PATCH10.MSP.

4.  Click "Finish" and "Save" in the McAfee
    Installation Designer and a new installation
    package will be saved to the destination folder
    you specified in Step 2.


__________________________________________________________
PARTICIPATING IN THE MCAFEE BETA PROGRAM

To download new beta software or to read about the
latest beta information, visit the McAfee beta web
site located at:
       http://www.mcafeesecurity.com/us/downloads/beta/mcafeebetahome.htm

To submit beta feedback on any McAfee product, send
e-mail to:

       mcafee_beta@mcafee.com

McAfee is devoted to providing solutions based on
your input.


__________________________________________________________
CONTACT INFORMATION

Technical Support
    Home Page
       http://www.mcafeesecurity.com/us/support/

    KnowledgeBase Search
       https://knowledgemap.mcafeesecurity.com/phpclient/homepage.aspx

    PrimeSupport Service Portal
       https://mysupport.mcafeesecurity.com

    Login credentials required.


McAfee Beta Program
    Beta Web Site
       http://www.mcafeesecurity.com/us/downloads/beta/mcafeebetahome.htm


Security Headquarters:  AVERT
(Anti-Virus & Vulnerability Emergency Response
Team)
    Home Page
       http://www.mcafeesecurity.com/us/security/home.asp

    Virus Information Library
       http://vil.mcafeesecurity.com/

    AVERT WebImmune & Submit a Virus Sample
       https://www.webimmune.net/default.asp

    AVERT DAT Notification Service
       http://vil.mcafeesecurity.com/vil/join-DAT-list.asp


Download Site
    Home Page
       http://www.mcafeesecurity.com/us/downloads/

    DAT File and Engine Updates
       http://www.mcafeesecurity.com/us/downloads/updates/

       ftp://ftp.mcafeesecurity.com/pub/antivirus/datfiles/4.x

    Product Upgrades
       https://secure.nai.com/us/forms/downloads/upgrades/login.asp

    Valid grant number required.
    Contact Customer Service


Training
    On-Site Training
       http://www.mcafeesecurity.com/us/services/security/home.htm
    McAfee University
       http://www.mcafeesecurity.com/us/services/education/mcafee/university.htm


Customer Service
    US, Canada, and Latin America toll-free:
   Phone:     +1-888-VIRUS NO or +1-888-847-8766
              Monday-Friday, 8am-8pm, Central Time

   E-mail:    https://secure.mcafeesecurity.com/us/forms/support/request_form.asp

   Web:       http://www.mcafee.com/us/default.asp
              http://www.mcafeesecurity.com/us/support/default.asp

For additional contact information (including
addresses and toll-free numbers for worldwide
offices), see the CONTACT file that accompanied your
original product release.


_____________________________________________________
COPYRIGHT AND TRADEMARK ATTRIBUTIONS

Copyright (C) 2005 McAfee, Inc. All Rights Reserved.
No part of this publication may be reproduced,
transmitted, transcribed, stored in a retrieval
system, or translated into any language in any form
orbyany means without the written permission of
McAfee, Inc., or its suppliers or affiliate
companies. To obtain this permission, write to the
attention of the McAfee legal department at: 5000
Headquarters Drive, Plano, Texas 75024, or call
+1-972-963-8000.


TRADEMARKS

Active Firewall, Active Security, ActiveSecurity
(and in Katakana), ActiveShield, AntiVirus Anyware
and design, Clean-Up, Design (Stylized E), Design
(Stylized N), Entercept, Enterprise SecureCast,
Enterprise SecureCast (and in Katakana), ePolicy
Orchestrator,  First Aid, ForceField, GMT,
GroupShield, GroupShield (and in Katakana), Guard
Dog,  HomeGuard, Hunter, IntruShield, Intrusion
Prevention Through Innovation, M and Design, McAfee,
McAfee (and in Katakana), McAfee and Design,
McAfee.com, McAfee VirusScan, NA Network Associates,
Net Tools, Net Tools (and in Katakana), NetCrypto,
NetOctopus, NetScan, NetShield, Network Associates,
Network Associates Coliseum, NetXray, NotesGuard,
Nuts & Bolts, Oil Change, PC Medic, PCNotary,
PrimeSupport, RingFence, Router PM, SecureCast,
SecureSelect, SpamKiller, Stalker, ThreatScan, TIS,
TMEG, Total Virus Defense, Trusted Mail,
Uninstaller, Virex, Virus Forum, Viruscan,
VirusScan, VirusScan (And In Katakana), WebScan,
WebShield, WebShield (And In Katakana), WebStalker,
WebWall, Whats The State Of Your IDS?, Whos
Watching Your Network, Your E-Business Defender,
Your Network. Our Business. are registered
trademarks or trademarks of McAfee, Inc. and/or its
affiliates in the US and/or other countries. Red in
connection with security is distinctive of McAfee(R)
brand products.  All other registered and
unregistered trademarks herein are the sole property
of their respective owners.



_____________________________________________________
LICENSE INFORMATION

LICENSE AGREEMENT

NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE
LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU
PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND
CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF
YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE
ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED
LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT
ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU HAVE
RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A
BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE
AVAILABLE ON THE WEB SITE FROM WHICH YOU DOWNLOADED
THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF
THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL
THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE
PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A
FULL REFUND.


LICENSE ATTRIBUTIONS

This product includes or may include:
*Software developed by the OpenSSL Project for use
in the OpenSSL Toolkit (http://www.openssl.org/).
*Cryptographic software written by Eric A. Young
and software written by Tim J. Hudson. *Some
software programs that are licensed (or sublicensed)
to the user under the GNU General Public License
(GPL) or other similar Free Software licenses which,
among other rights, permit the user to copy, modify
and redistribute certain programs, or portions
thereof, and have access to the source code. The GPL
requires that for any software covered under the GPL
which is distributed to someone in an executable
binary format, that the source code also be made
available to those users. For any such software
covered under the GPL, the source code is made
available on this CD. If any Free Software licenses
require that Network Associates provide rights to
use, copy or modify a software program that are
broader than the rights granted in this agreement,
then such rights shall take precedence over the
rights and restrictions herein.  *Software
originally written by Henry Spencer, Copyright 1992,
1993, 1994, 1997 Henry Spencer.  *Software
originally written by Robert Nordier, Copyright
(C)1996-7 Robert Nordier.  *Software written by
Douglas W. Sauder.  *Software developed by the
Apache Software Foundation (http://www.apache.org/).
A copy of the license agreement for this software
can be found at
www.apache.org/licenses/LICENSE-2.0.txt.
*International Components for Unicode ("ICU")
Copyright (C)1995-2002 International Business
Machines Corporation and others.  *Software
developed by CrystalClear Software, Inc., Copyright
(C)2000 CrystalClear Software, Inc. *FEAD(R)
Optimizer(R)  technology, Copyright Netopsystems AG,
Berlin, Germany. *Outside In(R)  Viewer Technology
(C)1992-2001 Stellent Chicago, Inc. and/or Outside
In(R) HTML Export, (C)2001 Stellent Chicago, Inc.
*Software copyrighted by Thai Open Source Software
Center Ltd. and Clark Cooper, (C)1998, 1999, 2000.
*Software copyrighted by Expat maintainers.
*Software copyrighted by The Regents of the
University of California, (C)1989.  *Software
copyrighted by Gunnar Ritter.  *Software
copyrighted by Sun Microsystems(R), Inc. (C)2003.
*Software copyrighted by Gisle Aas. (C)1995-2003.
*Software copyrighted by Michael A. Chase,
(C)1999-2000.  *Software copyrighted by Neil
Winton, (C)1995-1996.  *Software copyrighted by
RSA Data Security, Inc., (C)1990-1992.  *Software
copyrighted by Sean M. Burke, (C)1999, 2000.
*Software copyrighted by Martijn Koster, (C)1995.
*Software copyrighted by Brad Appleton,
(C)1996-1999.  *Software copyrighted by Michael G.
Schwern, (C)2001.  *Software copyrighted by Graham
Barr, (C)1998.  *Software copyrighted by Larry
Wall and Clark Cooper, (C)1998-2000.  *Software
copyrighted by Frodo Looijaard, (C)1997.
*Software copyrighted by the Python Software
Foundation, Copyright (C)2001, 2002, 2003. A copy
of the license agreement for this software can be
found at www.python.org.  *Software copyrighted by
Beman Dawes, (C)1994-1999, 2002.  *Software
written by Andrew Lumsdaine, Lie-Quan Lee, Jeremy G.
Siek (C)1997-2000 University of Notre Dame.
*Software copyrighted by Simone Bordet & Marco
Cravero, (C)2002.  *Software copyrighted by
Stephen Purcell, (C)2001.  *Software developed by
the Indiana University Extreme! Lab
http://www.extreme.indiana.edu/).  *Software
copyrighted by International Business Machines
Corporation and others, (C)1995-2003.  *Software
developed by the University of California, Berkeley
and its contributors.  *Software developed by Ralf
S. Engelschall <rse@engelschall.com> for use in the
mod_ssl project (http://www.modssl.org/).
*Software copyrighted by Kevlin Henney,
(C)2000-2002.  *Software copyrighted by Peter
Dimov and Multi Media Ltd. (C)2001, 2002.
*Software copyrighted by David Abrahams, (C)2001,
2002. See http://www.boost.org/libs/bind/ bind.html
for documentation.  *Software copyrighted by Steve
Cleary, Beman Dawes, Howard Hinnant & John Maddock,
(C)2000.  *Software copyrighted by Boost.org,
(C)1999-2002.  *Software copyrighted by Nicolai M.
Josuttis, (C)1999.  *Software copyrighted by
Jeremy Siek, (C)1999-2001.  *Software copyrighted
by Daryle Walker, (C)2001.  *Software copyrighted
by Chuck Allison and Jeremy Siek, (C)2001, 2002.
*Software copyrighted by Samuel Krempp, (C)2001.
See http://www.boost.org for updates, documentation,
and revision history.  *Software copyrighted by
Doug Gregor (gregod@cs.rpi.edu), (C)2001, 2002.
*Software copyrighted by Cadenza New Zealand Ltd.,
(C)2000.  *Software copyrighted by Jens Maurer,
(C)2000, 2001.  *Software copyrighted by Jaakko
Jrvi (jaakko.jarvi@cs.utu.fi), (C)1999, 2000.
*Software copyrighted by Ronald Garcia, (C)2002.
*Software copyrighted by David Abrahams, Jeremy
Siek, and Daryle Walker, (C)1999-2001.  *Software
copyrighted by Stephen Cleary (shammah@voyager.net),
(C)2000.  *Software copyrighted by Housemarque Oy
<http:// www.housemarque.com>,(C)2001.  *Software
copyrighted by Paul Moore, (C)1999.  *Software
copyrighted by Dr. John Maddock, (C)1998-2002.
*Software copyrighted by Greg Colvin and Beman
Dawes, (C)1998, 1999.  *Software copyrighted by
Peter Dimov, (C)2001, 2002.  *Software copyrighted
by Jeremy Siek and John R. Bandela, (C)2001.
*Software copyrighted by Joerg Walter and Mathias
Koch, (C)2000-2002.

