On Tue, 2 Mar 2004, Erik Corry wrote:

> On Tue, Mar 02, 2004 at 11:59:19AM -0600, John Jolet wrote:
> >
> >> The question is how much of a problem it really is.  Are users
> >> really that dumb?
> >
> > yes, they are.  i've gotten about 10 of those in the last 3 days.
>
> That doesn't actually prove that anyone typed in the password
> and got infected.  The version with unencrypted zip file can
> send the version with encrypted zip file to others.
>
> The best defence against it (if it really is a problem) might
> be blocking encrypted zip files with suspicious filenames in
> them.  You can see that the file contains a .exe .pif, etc.
> ending without the password.
>
> That's probably not a task for clamav though, more like MIMEDefang:
> http://www.mimedefang.org/
>
> Someone seems to have been giving this some thought:
> http://lists.roaringpenguin.com/pipermail/mimedefang/2004-March/020563.html

I think clamav should return a certain value if the zip file is deemed
clean because it's encrypted, so that glue programs like amavisd-new can
allow people to control when encrypted zips are allowed through. This is a
reasonable thing for clamav to do regardless, if you think about it;
isn't that essentially an error condition ("can't scan zipfile")?

It would seem a simple fix for somebody familiar with the code.
Developers, any comments?

Thanks,
Andy

---
Andy Dills
Xecunet, Inc.
www.xecu.net
301-682-9972
---


-------------------------------------------------------
SF.Net is sponsored by: Speed Start Your Linux Apps Now.
Build and deploy apps & Web services for Linux with
a free DVD software kit from IBM. Click Now!
http://ads.osdn.com/?ad_id=1356&alloc_id=3438&op=click
_______________________________________________
Clamav-users mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/clamav-users

Reply via email to