On 04/22/2010 10:01 AM, Thomas Herzog wrote:
>
> Amavis seems to be calling the clam deamon, it finds also some other
> exploits, viruses...
> /var/log/clamav/clamav.log:
> Thu Apr 22 08:15:07 2010 -> /tmp/UPS_invoice_4557.zip:
> Suspect.Bredozip-zippwd-5 FOUND
BTW attachments are automatically removed on this mailing list.
> Thu Apr 22 08:23:53 2010 ->
> /var/lib/amavis/tmp/amavis-20100422T082307-19639/parts/p002:
> Exploit.HTML.IFrame-8 FOUND
> Thu Apr 22 08:23:53 2010 ->
> /var/lib/amavis/tmp/amavis-20100422T082307-19639/parts/p003: Worm.NetSky-14
> FOUND
>
> Here you can see (UPS_invoice_4557.zip) was recognized with manually
> scanning.
Is that the email, or the attachment? I guess it is the attachment.
Try scanning the email containing that attachment with
clamscan/clamdscan, and see if it is detected.
>
> lxhv1m02:~# dpkg -l | grep clam
> ii clamav 0.95.3+dfsg-1~volatile1 anti-virus
> utility for Unix - command-line i
> ii clamav-base 0.95.3+dfsg-1~volatile1 anti-virus
> utility for Unix - base package
> ii clamav-daemon 0.95.3+dfsg-1~volatile1 anti-virus
> utility for Unix - scanner daemon
> ii clamav-freshclam 0.95.3+dfsg-1~volatile1 anti-virus
> utility for Unix - virus database
> ii libclamav6 0.95.3+dfsg-1~volatile1 anti-virus
> utility for Unix - library
>
> lxhv1m02:~# ps -eaf| grep clam
> clamav 2926 1 0 2009 ? 00:01:49 /usr/bin/freshclam -d
> --quiet
> clamav 16517 1 1 Apr21 ? 00:12:39 /usr/sbin/clamd
> root 25902 23655 0 08:58 pts/1 00:00:00 grep clam
>
> lxhv1m02:~# grep ctl /etc/amavis/conf.d/15-av_scanners
> \&ask_daemon, ["CONTSCAN {}\n", "/var/run/clamav/clamd.ctl"],
>
> lxhv1m02:~# grep ctl /etc/clamav/clamd.conf
> LocalSocket /var/run/clamav/clamd.ctl
>
> Looks good to me...any ideas left?
>
> /Thomas
>
>
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml