Forrest Aldrich <[EMAIL PROTECTED]> writes:

> Has anyone filters for Spamassassin that will correctly identify this
> virus?  I'd like to score this one high so they are rejected (via
> spamass-milter)... it's been a huge problem all day.

header  _VIRUS_h0_SWEN_A SUBJECT =~ m{(Current|Newest|New|Last|Latest)? 
?(Internet|Network|Net|Microsoft)? ?(Security|Critical)? ?(Patch|Upgrade|Pack|Update)}i
header  _VIRUS_h2_SWEN_A From =~ m{(Microsoft|MS)? ?(Internet|Corporation)? 
?(Technical|Security|Customer|Public)? 
?(Assistance|Services|Center|Bulletin|Division|Section)}i
rawbody  _VIRUS_b4_SWEN_A m{Undeliver(able|ed) (mail|message)? ?to}i
meta     VIRUS_m_SWEN_A ((_VIRUS_h0_SWEN_A && ( MICROSOFT_EXECUTABLE || 
MIME_SUSPECT_NAME ) && _VIRUS_h2_SWEN_A) || (_VIRUS_b4_SWEN_A && ( 
MICROSOFT_EXECUTABLE || MIME_SUSPECT_NAME )))
describe VIRUS_m_SWEN_A 
http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SWEN.A
score    VIRUS_m_SWEN_A 10.0

At least, that's what I came up with before I gave in and installed
ClamAV, which has successfully capture 8MB of this virus over the past
18 hours.  I've got a procmail-compatible ClamAV configuration here:
<http://mah.everybody.org/weblog/archive/80614253>

Note that you may want to replace the 

    ( MICROSOFT_EXECUTABLE || MIME_SUSPECT_NAME )

with something else.  Some SMTP gateways strip the actual executable
out, but send the rest of the message on its way.  In such a case,
you still get the emails.

Mark.

-- 
If you want to know who is funding terrorists, look in the vanity
mirror as you turn the key of your SUV.
    -- http://philip.greenspun.com/politics/israel/



-------------------------------------------------------
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf
_______________________________________________
Spamassassin-talk mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/spamassassin-talk

Reply via email to