Andreas is probably correct.  This signature does appear to be problematic.  
Detections only recently started to appear because of changes in 0.103.1 to 
properly handle TIFF files.
The signature wasn’t working in prior clamav versions because TIFF file type 
detection was missing from the daily database.  We only discovered the file 
type detection signatures for TIFF were missing when fixing up the TIFF format 
verification module. And we didn’t know it was missing at the time the 
signature was published.

Anyhow, we dropped this signature about an hour ago. It should disappear in the 
next daily database version. Thanks for the FP report Andreas.

-Micah

From: clamav-users <clamav-users-boun...@lists.clamav.net> On Behalf Of Al 
Varnell via clamav-users
Sent: Friday, May 7, 2021 4:04 AM
To: ClamAV users ML <clamav-users@lists.clamav.net>
Cc: Al Varnell <alvarn...@mac.com>
Subject: Re: [clamav-users] State of false-positive message evaluation for 
Img.Exploit.CVE_2017_3049-6268090-0

One additional note. That signature has been in the ClamAV.ldb database since 
19 Apr 2017 back when first defined, making it relatively unlikely to be a 
false positive at this point in time.

Also note from the CVE-2017-3049 detail 
<https://nvd.nist.gov/vuln/detail/CVE-2017-3049> that it was at the time 
considered to be a High threat to Adobe Acrobat Reader versions back then. I'm 
certain that Adobe has eliminated the threat by now in modern versions, but 
that doesn't render any exploit as a false positive since it could still be 
used to target users who still need to run those older applications for 
economic or other reasons.

-Al-

[Image removed by sender.]
Powered by 
Mailbutler<https://www.mailbutler.io/?utm_source=watermark&utm_medium=email&utm_campaign=watermark-essential-email>,
 the email extension that does it all

On May 7, 2021, at 00:59, Al Varnell 
<alvarn...@mac.com<mailto:alvarn...@mac.com>> wrote:
Prof Rulle,

I believe you mean a false positive, don't you? A false negative would be a 
failure to report, but clearly ClamAV does detect this.

The proper way to report this would be to file a False Positive Report here: 
<https://www.clamav.net/reports/fp>. If you can also provide a hash value of 
file in question back here, that might speed up the process. Simply verifying 
one of these hash values from the VirusTotal report will work:

MD5
04267b6af9a1bad85d5cd6aecb1e4d28
SHA-1
cf7d73066f921fc7101c06aebc5e090cebffd2b2
SHA-256
7563a2b175d3c48069960e0290ac08e3f379cd74307e44c995df52d5dc6fc002

[Image removed by sender.]
Powered by 
Mailbutler<https://www.mailbutler.io/?utm_source=watermark&utm_medium=email&utm_campaign=watermark-essential-email>,
 the email extension that does it all

-Al-
ClamXAV User

On May 6, 2021, at 23:46, Andreas Rulle 
<andreas.ru...@itek.de<mailto:andreas.ru...@itek.de>> wrote:

Hi, thank you for your great service to internet security!
A false negative report has been issued this week for 
Img.Exploit.CVE_2017_3049-6268090-0, see also the virus total report under [1].
The issue has to be handled under the General Data Protection Regulation 
(GDPR). Therefore I would politely like to ask for the evaluation state of that 
false negative report.
Thanks in advance for your kind response.
[1] 
https://www.virustotal.com/gui/file/7563a2b175d3c48069960e0290ac08e3f379cd74307e44c995df52d5dc6fc002/detection
--


P.S. Abonnieren Sie unseren Newsletter zu den aktuellen Themen der 
Standardisierung und IT-Lösungen in Ihrer Branche!
https://www.itek.de/aktuelles/newsletter

ITEK Technologie GmbH
Technologiepark 14
33100 Paderborn

Tel. +49 5251 / 16140
Fax +49 5251 / 161499
www.itek.de<http://www.itek.de/>
mailto: Andreas ru...@itek.de<mailto:ru...@itek.de>

Geschäftsführer: Prof. Dr. Uwe Kern
Registergericht /-nummer: Paderborn / HRB 13522


_______________________________________________

clamav-users mailing list
clamav-users@lists.clamav.net
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to