Dominique Sarrazin wrote:
Hi everyone,

On October 26^th , ClamAV’s signature database was updated with the addition of Win.Downloader.DDECmdExec-6715271-0, for which I cannot find any information despite my thorough research.

sigtool --find-sigs [sig name] |sigtool --decode-sigs will at least tell you what it's matching on, assuming it's an active signature.

I don't seem to have that particular signature on any system I manage, so either it's third-party or it was dropped at some point.

The closest matches on that sig name that I have are Win.Downloader.DDEObfuscatedCmdExec-6715127-0 and Win.Downloader.DDEObfuscatedCmdExec-6715128-0.

Since that update, ClamAV has reported that many tables in our MySQL are susceptible to this vulnerability. I would simply like to know the details of this vulnerability and how to identify it in our database.

Scanning the filesystem storage for any DBMS is almost certainly a waste of time and likely to lead to all kinds of bizarre false positives.

If you really need to scan the content, scan things before inserting, or do a periodic "retrieve-and-scan" process if you're worried about zero-day malware that might not have had a signature when it was inserted.

-kgd
_______________________________________________
clamav-users mailing list
[email protected]
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to