On Tue, 25 May 2010 07:56:17 -0700 Dennis Peterson <denni...@inetnw.com>
wrote:
> On 5/25/10 7:51 AM, Tomasz Kojm wrote:
>> On Tue, 25 May 2010 16:27:48 +0200 Sarocet<saro...@gmail.com>  wrote:
>>> Tomasz Kojm wrote:
>>>> This scenario makes no much sense to me. First of all, as I wrote in
>>>> the
>>>> previous email the files you provided as example are almost identical
>>>> (they only differ in high nibbles of six bytes) and they share the same
>>>> "payload", this means that both of them should be detected by the AV as
>>>> malicious (in this case even using a single MD5 signature!). Due to the
>>>> nature of MD5 weaknesses it's pretty much impossible to create a
>>>> working
>>>> malicious file that would have the same MD5 as, let's say notepad.exe.
>>>>
>>> What if it's an autoextracted file? ClamAV detects the inner compressed
>>> virus
>>> but not the executable heading.
>>
>> I don't get it.. if ClamAV detects a virus in any extracted file it
>> marks the whole container infected
>>
> 
> I think the suggested scenario is a file is placed on a system by some
> means. ClamAV sees it, makes a note of the MD5 hash, and the file size.
> It finds no payload inside. Time marches on and a second file with the
> same hash and size arrives. ClamAV doesn't bother scanning it as it
> believes it already has determined it is clean. A miracle occurs and the
> second file is executed and takes over the system.

What you described is the "original scenario", which doesn't make sense
anyway (see my explanation above)

-- 
   oo    .....         Tomasz Kojm <tk...@clamav.net>
  (\/)\.........         http://www.ClamAV.net/gpg/tkojm.gpg
     \..........._         0DCA5A08407D5288279DB43454822DC8985A444B
       //\   /\              Tue May 25 17:03:27 CEST 2010
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to