On Mon, 29 Jan 2007 19:15:10 +0100
Torsten Nitschke <[EMAIL PROTECTED]> wrote:

> Hi,
> 
> when looking for the bug which still exists in 0.88.7 as of Hendrik 
> Weimer - see http://www.quantenblog.net/security/virus-scanner-bypass 
> I was able to reproduced that thing (virus can passed uncatched) but 
> wondered how to fix it.
> 
> There are two reasons a virus can tunnel through ClamAV:
>   a) parseEmailBody reports "success" instead of "failure" when it 
> reaches the maximum recursion level
>   b) cli_magic_scandesc turns any format error it detects (CL_EFORMAT) 
> into CL_CLEAN.
> 
> Unfortunately b) is a general rule applied for any format supported by 
> cli_magic_scandesc. Thus I do not think that b) is a fine security 
> policy: It lets pass what can not be understood. Thus an attacker 
> just needs to find an error in clamavs understanding of a packer's 
> format and the virus can tunnel through.
> 
> Because it is a deep cut to change b) I ask:
> What do you think about the attached patch? (I diffed it against plain 
> 0.88.7.)

http://cvsweb.clamav.net/bin/cgi/viewvc.cgi/clamav-devel/libclamav/mbox.c?revision=1.372&view=markup

> 
> Probably b) has been coded with full intent. Have I missed anything?

b) is a completely different story

-- 
   oo    .....         Tomasz Kojm <[EMAIL PROTECTED]>
  (\/)\.........         http://www.ClamAV.net/gpg/tkojm.gpg
     \..........._         0DCA5A08407D5288279DB43454822DC8985A444B
       //\   /\              Mon Jan 29 19:37:47 CET 2007
_______________________________________________
http://lurker.clamav.net/list/clamav-devel.html

Reply via email to