Hello !  
  
I've submitted on monday a false-positive on that both form, but I didn't get 
any answer from now, and this false-positive is still in databases.  
http://www.clamav.net/lang/en/sendvirus/submit-fp/  
http://cgi.clamav.net/sendfp.cgi  
  
  
False positive is "PHP.Shell-51", in main.cvd (now) :  
  
# sigtool  --find-sigs=PHP.Shell-51 | sigtool --decode-sigs  
VIRUS NAME: PHP.Shell-51  
TARGET TYPE: HTML  
OFFSET: *  
DECODED SIGNATURE:  
jf9ypwjhc2u2nf9kzwnvzguojf9yktskx1g9c3rydhiojf9ylccxmjm0ntzhb3vpzscsj2fvdwllmtizndu2jyk7jf9spwvyzwdfcmvwbgfjzsgnx19gsuxfx18nlcinii4kx0yuiicilcrfwck7zxzhbcgkx1ipoyrfuj0woyrfwd0wow==
  
  
This signature match base64 code 
'JF9YPWJhc2U2NF9kZWNvZGUoJF9YKTskX1g9c3RydHIoJF9YLCcxMjM0NTZhb3VpZScsJ2FvdWllMTIzNDU2Jyk7JF9SPWVyZWdfcmVwbGFjZSgnX19GSUxFX18nLCInIi4kX0YuIiciLCRfWCk7ZXZhbCgkX1IpOyRfUj0wOyRfWD0wOw==',
 which seems to be a generic encryption function :  
  
# ../b64z.py -de 
'JF9YPWJhc2U2NF9kZWNvZGUoJF9YKTskX1g9c3RydHIoJF9YLCcxMjM0NTZhb3VpZScsJ2FvdWllMTIzNDU2Jyk7JF9SPWVyZWdfcmVwbGFjZSgnX19GSUxFX18nLCInIi4kX0YuIiciLCRfWCk7ZXZhbCgkX1IpOyRfUj0wOyRfWD0wOw=='
  
$_X=base64_decode($_X);$_X=strtr($_X,'123456aouie','aouie123456');$_R=ereg_replace('__FILE__',"'".$_F."'",$_X);eval($_R);$_R=0;$_X=0;
  
  
And that code is used by regular php tools, like one named "Picasa Virtual 
Album" http://virtualdesigners.co.uk/projects/wb-extensions/@picasa-album/  
  
  
Could you please remove that false-positive, and send me the right url to 
submit false-positive a next time :) ?  
  
Best regards,  
--  
Siméon Gourlin 
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to