You are right. But more than that, merely *reading* a file will exercise such
code. I wonder if anybody has devised a file which exploits such a kernel bug?
(Shudder.)
After I wrote my objection, I realized that to be even more safe, one should
scan removable disks at the block level before
--On Friday, June 09, 2023 6:40 PM -0400 Paul Kosinski via clamav-users
wrote:
I have on occasion heard of vulnerabilities in some archiving software,
where the mere act of decompressing and extracting an archive can result
in malicious code execution due to a bug in the archiving software.
I must say I strongly disagree with the approach of feeding files contained in
a big archive file one at a time to ClamAV. That's because an archive is
*itself* a file.
I have on occasion heard of vulnerabilities in some archiving software, where
the mere act of decompressing and extracting an
--On Friday, June 09, 2023 3:45 PM +0100 Fergus Courtney via clamav-users
wrote:
Is it possible to run "clanscan - r " and "freshclam" from a
command prompt without the need of going into the C:\Program Files\ClamAV
folder to start or run these .exe's?
I tried adding the ";C:\Program
Hi,
Is it possible to run "clanscan - r " and "freshclam" from a
command prompt without the need of going into the C:\Program Files\ClamAV
folder to start or run these .exe's?
I tried adding the ";C:\Program Files\ClamAV" to my Windows 8.1 machine set
of system environmental variables, restarted