Hi there,

On Thu, 30 May 2019, WagdeZ wrote

Using clamav...
Is there any way to find out what is the risk level (score/priority/...) of
the detected virus/malware?

The question is rather vague.

In many cases the signature name gives some sort of clue to what the
signature is about, so if you have a grasp of the infrastructure that
you're dealing with (if you don't - get one, quick) you can get a feel
for the relevance to you in your specific situation.  This is part of
the risk assessment that only you, with your very particular knowledge
of your situation, can make.

For example, if I were to see an incoming mail message flagged with

Win.Exploit.CVE_2019_0758-6968262-1

it wouldn't have me on the edge of my seat because I don't operate any
Windows boxes.  There's no risk to any of my equipment from an exploit
that can only attack a Windows operating system, although obviously
I'd want to understand the reason for the detection before I forwarded
the message to anyone else.  I'd also want to know why the message got
as far as it did through the chain of defences, because I haven't seen
a mail message trigger a detection since last September and that's the
way I like things to be.  Peaceful.  Nothing to keep me awake at night.

Increasingly commonly, successful attacks employ many vulnerabilities
rather than a single one.  Often these multiple vulnerabilities are
perceived as "low risk" individually, but when they're all brought
together by a competent attacker the result is a complete compromise
of the network.  Misery.  Any single detected threat is one too many.

--

73,
Ged.

_______________________________________________

clamav-users mailing list
clamav-users@lists.clamav.net
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to