On Mon, Nov 08, 2004 at 01:52:42PM -0500, Jason Frisvold wrote:
>Looks like something is stripping the virus out before it ever hit clamav.. 
>However, I did get a copy with the virus in it, and clamscan doesn't detect
>it...  I'm not sure why though ...

Okay, this is getting strange. I've taken the raw email and run that by
clamscan again, with and without the --mail flag, and in both cases it
successfully detects the Eicar test signature.

The only way I can get it to *not* detect the Eicar test signature is to
edit the file so that only the attachment text itself is in the file; that
is the file only contains:

  begin 600 eicar.com
    :
    :
  end

Where the ":" are removed lines. The Eicar virus is still found if you
cut the file down to just the following:

  From [EMAIL PROTECTED]  Tue Nov  9 01:32:06 2004

  begin 600 eicar.com
  M6#5/(5`E0$%06S1<4%I8-30H4%XI-T-#*3=])$5)0T%2+5-404Y$05)$+4%.
  85$E625)54RU415-4+49)3$4A)[EMAIL PROTECTED]"H@
  `
  end

clamscan fails to find the Eicar virus if you remove the "From " header at
the start of the file; to be fair this does make sense. Now the one
interesting thing here is that I'm dealing with an mbox format email and
I'm guessing from the file name you postsed that you used a message from
a maildir format mail spool. That said, the first test I posted about also
used a message from a maildir format mail spool. In a test I've just done
clamscan finds the Eicar virus if you replace the "From " header above
to a suitable "To:" one instead.

I think what it comes down to is what it takes ClamAV to see the file as
a mail message rather than the uuencoded text; if it treats it as a mail
message then it'll decode the uuencoded text and find the Eicar virus
within. However if it does not treat it as a mail message then it will
not decode the uuencoded text and thus not match the Eicar virus signature
to the file. To me this is understandable since the uuencoded file by itself
is not a risk since it takes user interaction to get the file out. However
within a mail message there is a higher risk that a user can be conned into
opening the attachment.

FWIW I'm running the same version of clamscan with the same virus signature
set on Solaris 9 (both SPARC and x86): 

  % clamscan -V
  ClamAV 0.80/578/Mon Nov  8 14:26:49 2004
  %

-- 
    Simon the stressed        http://www.bpfh.net/           [EMAIL PROTECTED]
                 Chocolate is *not* a substitute for sleep
_______________________________________________
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users

Reply via email to