Hi,

As you know, the Clam folks continue their tradition of security problems,
and have released version 0.88 to plug the latest hole discovered.

However, there seems to be a regression in 0.88 compared to 0.87.1.
The file http://www.roaringpenguin.com/msg-1212-47.zip contains an EICAR
test virus in a "deflate64" zip file.

Clam's built-in ZIP code doesn't handle deflate64, but the external
UNIX utility "unzip" does.  So in earlier versions, clamscan --unzip
msg-1212-47.zip finds the EICAR:

$ clamscan --unzip msg-1212-47.zip 
/home/dfs/msg-1212-47.zip: Zip module failure
Archive:  /home/dfs/msg-1212-47.zip
  inflating: eicar.com               
/tmp/clamav-364678599ce3d6be/eicar.com: Eicar-Test-Signature FOUND
/home/dfs/msg-1212-47.zip: Infected.Archive FOUND

whereas 0.88 reacts thus:

$ clamscan --unzip msg-1212-47.zip 
/home/dfs/msg-1212-47.zip: OK

I tried reading the Clam source code to figure out the difficulty,
but soon got lost in a maze of twisty little passages, all alike.

I have filed a bug report at clamav.net.

Regards,

David.
_______________________________________________
NOTE: If there is a disclaimer or other legal boilerplate in the above
message, it is NULL AND VOID.  You may ignore it.

Visit http://www.mimedefang.org and http://www.roaringpenguin.com
MIMEDefang mailing list [email protected]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang

Reply via email to