Hi there

I have a viral *.jar file that clamscan and clamdscan cannot find anything wrong with, but if I run "clamscan --jar file.jar", it finds the trojans.

JAR files are meant to be ZIP files, but if I manually run unzip over it I see:

Archive:  loaderadv50.jar
warning [loaderadv50.jar]:  262 extra bytes at beginning or within zipfile
 (attempting to process anyway)
   testing: Counter.class            OK
   testing: Dummy.class              OK
   testing: Matrix.class             OK
   testing: Parser.class             OK
No errors detected in compressed data of loaderadv50.jar.


So there is some junk in there that unzip skips over - but I'm wondering if that same junk allows it to bypass clamscan/clamd's standard methods of discovering if it's a JAR file? When I run "clamscan --jar loaderadv50.zip", I see clamscan calling "/usr/bin/unzip" - so I assume without that option, clamscan uses internal unzip routines, and with it clamscan calls /usr/bin/unzip?


--
Cheers

Jason Haar
Information Security Manager, Trimble Navigation Ltd.
Phone: +64 3 9635 377 Fax: +64 3 9635 417
PGP Fingerprint: 7A2E 0407 C9A6 CAF6 2B9F 8422 C063 5EBB FE1D 66D1

_______________________________________________
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users

Reply via email to