<I thought I sent following email but my email provider is really bad so 
it's not showing up in sent items. So sending again just be sure; sorry for 
spam>

Hello Ralf,

I hope I can ask follow up question. You wrote:

> I doesn't (from the clamonacc man page):

> The clamonacc daemon registers for file access notifications from the
> Linux kernel and in response, submits scans to the clamd scanning
> daemon for a verdict. On-Access requires a kernel version >= 3.8,
> because it leverages a kernel api called --> fanotify <-- to block
> processes from attempting to access malicious files.

I have verified that a file opened using memory mapped io when closed through 
close() will result in fanotify notification. But I wanted to know whether 
following is possible:

- we are running clamonacc
- file is opened using memory mapped io.

At this point, can it get infected? If yes, and if this file executable, can it 
get executed _along with it's infected code_ **without being closed**?

Thanks in advance,
-Neel.

From: Ralf Hildebrandt via clamav-users <clamav-users@lists.clamav.net>
Sent: Thu, 05 Dec 2024 16:05:32
To: clamav-users@lists.clamav.net
Cc: Ralf Hildebrandt <ralf.hildebra...@charite.de>
Subject: Re: [clamav-users] [ext] Scanning memory mapped files

> I am not using clamonacc. I run my own program that uses fanotify, just 
like clamonacc does, and gets list of files that are modifedadded.
> I send that list to clamscan or clamdscan.

A bit like incrond (which uses inotify() )

> The problem is limitation of fanotify which is that "The fanotify API 
does not report file accesses and modifications that may occur because of 
mmap(2), msync(2), and munmap(2)."

Same goes for inotify() -- just checked.

So whenever a process alters a file using mmap()/munmap() or msync(),
your program (or rather inotify/fanotify) doesn't detect any change,
and thus the file wont be in the list passed to clamscan or clamdscan.

> Now my assumption is mmap, msync, munmap deals with memory mapped files. 
So questions I have are:
> "does clamav scan memory mapped files?"

Yes: After all, a file is just a file. In the end, it's all on disk.

> Further details: If run clamscan or clamdscan on "/"; it would 
scan all files so it does not matter.
> But how does clamonacc overcomes this limitation since it uses fanotify?

I doesn't (from the clamonacc man page):

The clamonacc daemon registers for file access notifications from the
Linux kernel and in response, submits scans to the clamd scanning
daemon for a verdict. On-Access requires a kernel version >= 3.8,
because it leverages a kernel api called --> fanotify <-- to block
processes from attempting to access malicious files.

> If it does, is there a way to ask clamav to scan just memory mapped files?

I'm not sure if this can easily be detected.

I guess one could monitor mmap() calls via dtrace, but I'm just guessing!

--
Ralf Hildebrandt
Charitæcopy; - Universitätsmedizin Berlin
Geschäftsbereich IT | Abteilung Netz | Netzwerk-Administration
Invalidenstraße 120/121 | D-10115 Berlin

Tel. +49 30 450 570 155
ralf.hildebra...@charite.de
https://www.charite.de
_______________________________________________

Manage your clamav-users mailing list subscription / unsubscribe:
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/Cisco-Talos/clamav-documentation

https://docs.clamav.net/#mailing-lists-and-chat
_______________________________________________

Manage your clamav-users mailing list subscription / unsubscribe:
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/Cisco-Talos/clamav-documentation

https://docs.clamav.net/#mailing-lists-and-chat

Reply via email to