Hi there,

On Wed, 7 Apr 2021, Paul Kosinski via clamav-users wrote:

Seems to me that this behavior, advertising a 4GB limit while
silently imposing a 2GB limit and reporting "OK" for anything in
between, is a *major* security flaw: ClamAV *must* report that the
file was too big to deal with (however worded).

Don't get too excited about it.  When ClamAV says "OK" it really means
"I didn't find anything in there", which if you're unlucky it will say
for maybe two out of three infected files anyway.  Getting bent out of
shape about a couple of files which happen to give that result because
they're huge and the scanner gives up on them is simply not seeing the
Big Picture.

You will have problems if you believe everything ClamAV (or indeed any
other virus scanner) tells you.  No scanner will give you an accurate
result every time.  The best anyone can hope for, with ANY scanner and
ANY profile of data, is probably four out of five, so if you're seeing
thousands of malicious samples every day, and all you do is trust your
virus scanners to be right every time, you'll be accepting hundreds of
malicious samples daily at least.

My take on it is that the way to use ClamAV is to try to have it give
you an estimate of the credibility the data sources rather than to try
to whack all the moles, which is usually a fruitless exercise and will
inevitably lead to failure.

Thus I've taken to using clamscan rather than clamdscan (slow though
that is), because at least it reports how many bytes were read, and
how many scanned, so I can see what's going on.

You can easily put something together which gives you that information
but still uses clamd.  If anyone wants to take a project and run with
it I'll be happy to post some Perl code which sends a stream to clamd.
It would take care of the ugly inter-process communications, leaving
our hero to make it somehow useful.  Perhaps on the development list,
or the ClamAV Bugzilla.

P.S. Recently I've downloaded some MP3s from Amazon and scanned them
(as I do everything I download -- except updates from my Linux
distros). But for a reason I saw on this list -- but can't remember
-- MP3s are fully read, but not scanned. Is this going to be
remedied?

See this thread:

https://marc.info/?l=clamav-users&m=150039601417286&w=2

See also the messages in 2014 from Steve Basford on Jul. 8 and Sep 17,
and Douglas Goddard on Sep 25:

https://marc.info/?l=clamav-users&w=2&r=1&s=MP3&q=b

See also

https://bugzilla.clamav.net/show_bug.cgi?id=11582

which tells me that there's plenty of work still to do but it isn't at
the top of anybody's priority list.  The bottom line seems to be that
MP3 viruses are, if not non-existent, relatively rare and there's more
to be achieved looking for things which masquerade as MP3 but aren't.

--

73,
Ged.

_______________________________________________

clamav-users mailing list
clamav-users@lists.clamav.net
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to