On Wed, 08 Dec 2004 13:25:51 +1300
Jason Haar <[EMAIL PROTECTED]> wrote:

> Hi there
> 
> I have a viral *.jar file that clamscan and clamdscan cannot find 
> anything wrong with, but if I run "clamscan --jar file.jar", it finds 
> the trojans.
> 
> JAR files are meant to be ZIP files, but if I manually run unzip over
> it I see:
> 
> Archive:  loaderadv50.jar
> warning [loaderadv50.jar]:  262 extra bytes at beginning or within
> zipfile
>   (attempting to process anyway)
>     testing: Counter.class            OK
>     testing: Dummy.class              OK
>     testing: Matrix.class             OK
>     testing: Parser.class             OK
> No errors detected in compressed data of loaderadv50.jar.
> 
> 
> So there is some junk in there that  unzip skips over - but I'm 
> wondering if that same junk allows it to bypass clamscan/clamd's 
> standard methods of discovering if it's a JAR file? When I run
> "clamscan --jar loaderadv50.zip", I see clamscan calling
> "/usr/bin/unzip" - so I assume without that option, clamscan uses
> internal unzip routines, and with it clamscan calls /usr/bin/unzip?

We're not clairvoyants and can't help you without a sample. It was
instructed a few posts ago how to submit a bug.

-- 
   oo    .....         Tomasz Kojm <[EMAIL PROTECTED]>
  (\/)\.........         http://www.ClamAV.net/gpg/tkojm.gpg
     \..........._         0DCA5A08407D5288279DB43454822DC8985A444B
       //\   /\              Wed Dec  8 01:28:55 CET 2004

Attachment: pgp9oSdMr6Akg.pgp
Description: PGP signature

_______________________________________________
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users

Reply via email to