Thanks Mark. We're taking a look at this now.

- Alain

On Tue, Jan 24, 2017 at 5:53 AM, Mark Allan <markjal...@gmail.com> wrote:

> Hi,
>
> I've received a few reports of FPs with the signature
> Java.Exploit.CVE_2012_1723-8. I can't upload a sample because, of all
> places, it's being detected in the scan log which could contain sensitive
> information.
>
> Apart from the fact that it's very generic, looking only for a single
> short string, I see it's also looking for the "ANY FILE" type (0).  I've
> seen this a number of times with FPs lately, why are java sigs written to
> detect filetype 0 rather than type 12 which is specifically for Java
> Classes?
>
>         VIRUS NAME: Java.Exploit.CVE_2012_1723-8
>         TARGET TYPE: ANY FILE
>         OFFSET: *
>         DECODED SIGNATURE:
>         msf_/_x_/_PayloadX.class
>
> Cheers
> Mark
>
> PS. I padded the decoded signature with underscores to avoid this email
> being detected as infected.
>
> _______________________________________________
> clamav-users mailing list
> clamav-users@lists.clamav.net
> http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users
>
>
> Help us build a comprehensive ClamAV guide:
> https://github.com/vrtadmin/clamav-faq
>
> http://www.clamav.net/contact.html#ml
>
_______________________________________________
clamav-users mailing list
clamav-users@lists.clamav.net
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to