That's because you've gotten to the heart of the matter.

There's no real bug or code related vulnerability here; it's a user-side
network hardening issuing combined with a misunderstanding of clamd
configuration options that allows for this attack surface to exist.

As Steve has already pointed out, sound network security practices make
this a non-issue. Among other things, we're looking into improving the
configuration experience in coming releases of Clam, but for now, there's
already a solution to this problem.

- Mickey

On Thu, Sep 28, 2017 at 5:23 PM, Reindl Harald <h.rei...@thelounge.net>
wrote:

>
>
> Am 28.09.2017 um 23:02 schrieb Steven Morgan:
>
>> The fact that using clamd over TCP has insecurities has come up before. If
>> using clamd, it is recommended to use the local socket option rather than
>> a
>> TCP socket.
>>
>> # The daemon can work in local mode, network mode or both.
>> # Due to security reasons we recommend the local mode.
>>
>> Until it is fixed, only use TCP sockets on externally secured networks
>>
>
> sorry, but that is hardly related to whatever bug and can be said for any
> service in general
>
> _______________________________________________
> clamav-users mailing list
> clamav-users@lists.clamav.net
> http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users
>
>
> Help us build a comprehensive ClamAV guide:
> https://github.com/vrtadmin/clamav-faq
>
> http://www.clamav.net/contact.html#ml
>
_______________________________________________
clamav-users mailing list
clamav-users@lists.clamav.net
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to