Arnaud Huret <[EMAIL PROTECTED]> wrote:
> As we are experimenting ClamAV, we still maintain during evaluation 
> period a second (and historic) defense line with TrendMicro 
> VirusWall which we plan to abandon shortly.  I observed that 
> VirusWall (the second line defense) reported 8 hits on (SomeFool)
>  Worm.Netsky.P .Y .and .W.
> 
> 'DetectBrokenExecutables' is activated. (Logfiles are below).

Sometimes one scanner will pick up broken malware when another fails, it all 
depends if the section used by a particular scanner for a signature has been 
corrupted or not. In my experience Clam tends to pick up a lot of damaged 
malware missed by the 'big gun' commercial scanners like Symantec and 
Kaspersky.

Clam checks the PE header etc for obvious signs of damage, however if the 
corruption lies in the actual code 'DetectBrokenExecutables' detection will 
fail (this is based on my reading of pe.c).

Regards,

Simon 
_______________________________________________
http://lurker.clamav.net/list/clamav-users.html

Reply via email to