> -----Original Message-----
> From: clamav-users-boun...@lists.clamav.net [mailto:clamav-users-
> boun...@lists.clamav.net] On Behalf Of Matt Olney
> Sent: Tuesday, October 23, 2012 2:58 PM
> To: ClamAV users ML
> Subject: Re: [clamav-users] Deep scanning of image files
> 
> Maarten, can you help us track this by adding a bug at
> https://bugzilla.clamav.net/?
> 
> Thanks,
> 
> Matt

Done.  Bug 5978.

Thanks,
Maarten


> 
> On Tue, Oct 23, 2012 at 2:18 PM, Maarten Broekman
> <mbroek...@maileig.com> wrote:
> > One thing I'm seeing more and more of is malware code (be it PHP or
> > ASP) embedded after GIF headers.  ClamAV sees the GIF header and
> > treats it like an image (properly), but then ClamAV sees an HTML
> > signature later in the file.  However, it doesn't do any
> normalization
> > on that HTML data.  Would it be possible to add an option to
clamscan
> > that does normalize the HTML data and analyzes it as usual?
> >
> >
> >
> > Example:
> >
> > LibClamAV debug: Recognized GIF file
> >
> > LibClamAV debug: in cli_check_jpeg_exploit()
> >
> > LibClamAV debug: Matched signature for file type HTML data at 4197
> >
> >
> >
> > Problem:
> >
> >   I have signatures that would match the normalized HTML data, but
> > because the GIF header is there, clamscan doesn't normalize the HTML
> > data.  This means that I have to create unique signatures for each
> > file with a GIF header that contains different non-normalized HTML
> data.
> >
> >
> >
> > Thanks,
> >
> > Maarten
> >
> > _______________________________________________
> > Help us build a comprehensive ClamAV guide: visit
> > http://wiki.clamav.net http://www.clamav.net/support/ml
> _______________________________________________
> Help us build a comprehensive ClamAV guide: visit
> http://wiki.clamav.net http://www.clamav.net/support/ml
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to