I'm not sure on the status of clamav and its ability to block the new
encrypted-zip-bagle variant(s?), but through the grapevine, we've heard of
a fairly simple way of stopping all of these.  I don't have all the
details, but it seems the archives are actually flagged as "zip 1.0,"
whereas most software these days produces "zip 2.0" archives.  So we have
a regexp to block on:

/^UEsDBAoAAAAAA/

Again, foggy on the details, but apparently encrypted 1.0's are off by
another byte:

/^UEsDBAoAAQAAA/

Blocking on these two regexp's should block the virus, AFAIK.  We've
blocked 20 in the past 10 or so minutes.

Bottom line, what's clamav's current take on this one?  Is there some way
we can just drop all protected archives outright?

Thanks,
  John




-- 
John Madden
UNIX Systems Engineer
Ivy Tech State College
[EMAIL PROTECTED]




-------------------------------------------------------
SF.Net is sponsored by: Speed Start Your Linux Apps Now.
Build and deploy apps & Web services for Linux with
a free DVD software kit from IBM. Click Now!
http://ads.osdn.com/?ad_id56&alloc_id438&op=click
_______________________________________________
Clamav-users mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/clamav-users

Reply via email to