Hi Guys,

Again troubling you. Can you please let me know why same virus is not
detected for windows server.
Do i need to enable any setting in ClamAv configuration?

 md5sum exploit.pdf
a3e8a7602797c69f6320225e8137d063  exploit.pdf

I was trying same exploit.pdf virus file (CVE-2009-4324) to upload in
Windows server and its not detected by ClamAv Antivirus.

*I tried with detect-pua also and it didn't worked for me*.

It works fine with curl and other software. *Maybe we have to handle
separately for windows server*.

Looks like its due to way windows servers work to upload file using
Boundary mechanism.

Below is output of virus file to clamav:

Content-Disposition: form-data; name="__EVENTVALIDATION"

/wEWBAK5276uAwLv4ZO6DgLmgPS1DQL374fcBaj9ZhJYdIZVwZS464ZHv7T3ou6w
-----------------------------21154944191352840482619583850
Content-Disposition: form-data; name="destination"





*/AnalyticsReports-----------------------------21154944191352840482619583850Content-Disposition:
form-data; name="ctl00$PlaceHolderMain$ctl01$ctl05$InputFile";
filename="exploit.pdf"Content-Type: application/force-download*
%PDF-1.1
1 0 obj
<< /Type /Catalog /Outlines 2 0 R /Pages 3 0 R /OpenAction 5 0 R >>
endobj
2 0 obj
<< /Type /Outlines /Count 0 >>
endobj
3 0 obj
<< /Type /Pages /Kids [4 0 R] /Count 1 >>
endobj
4 0 obj
<< /Type /Page /Parent 3 0 R /MediaBox [0 0 612 792] >>
endobj
5 0 obj
<< /Type /Action /S /JavaScript /JS (
  VIRUS DATA .....................
...........................................

        spray_heap();
        trigger_bug();

        ) >>
endobj
xref
0 6
0000000000 65535 f
0000000010 00000 n
0000000096 00000 n
0000000145 00000 n
0000000205 00000 n
0000000279 00000 n
trailer
<< /Size 6 /Root 1 0 R >>
startxref
1787
%%EOF
-----------------------------21154944191352840482619583850
Content-Disposition: form-data;
name="ctl00$PlaceHolderMain$ctl01$ctl05$OverwriteSingle"

on
-----------------------------21154944191352840482619583850
Content-Disposition: form-data; name="__spText1"


-----------------------------2115494419135284048261958385

On Thu, Jul 30, 2015 at 3:39 PM, P K <pkopen...@gmail.com> wrote:

> thanks Shaun. I seen its pushed in latest update.
>
> Hope to learn more from you guys.
>
> On Wed, Jul 29, 2015 at 7:32 PM, Shaun Hurley <shahu...@sourcefire.com>
> wrote:
>
>> PK,
>>
>> Thank you for bringing this to our attention.
>>
>> I have created another signature that doesn't rely upon PUA being enabled.
>> As soon as the signature is done being tested for false positives we will
>> publish it.
>>
>> Thanks again,
>> Shaun Hurley
>> ClamAV Malware Team
>>
>> On Tue, Jul 28, 2015 at 10:54 AM, P K <pkopen...@gmail.com> wrote:
>>
>> > worked properly after enabling PUA.
>> >
>> > Cheers,
>> > --PK
>> >
>> > On Tue, Jul 28, 2015 at 8:14 PM, Steve Basford <
>> > steveb_cla...@sanesecurity.com> wrote:
>> >
>> > >
>> > > On Tue, July 28, 2015 3:41 pm, P K wrote:
>> > > > So how to detect same in my clamAv?
>> > > >
>> > >
>> > > Until a proper sig is added, you could try
>> > >
>> > > clamscan  --detect-pua=yes
>> > >
>> > > Cheers,
>> > >
>> > > Steve
>> > > Web : sanesecurity.com
>> > > Blog: sanesecurity.blogspot.com
>> > >
>> > > _______________________________________________
>> > > Help us build a comprehensive ClamAV guide:
>> > > https://github.com/vrtadmin/clamav-faq
>> > >
>> > > http://www.clamav.net/contact.html#ml
>> > >
>> > _______________________________________________
>> > Help us build a comprehensive ClamAV guide:
>> > https://github.com/vrtadmin/clamav-faq
>> >
>> > http://www.clamav.net/contact.html#ml
>> >
>> _______________________________________________
>> Help us build a comprehensive ClamAV guide:
>> https://github.com/vrtadmin/clamav-faq
>>
>> http://www.clamav.net/contact.html#ml
>>
>
>
_______________________________________________
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to