Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 157438 - Bypassing clamav virus detection with broken base64 encoding
Summary: Bypassing clamav virus detection with broken base64 encoding
Status: RESOLVED DUPLICATE of bug 157698
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Antivirus Team
URL: http://www.quantenblog.net/security/v...
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2006-12-07 08:25 UTC by Hanno Böck
Modified: 2011-10-30 22:41 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Hanno Böck gentoo-dev 2006-12-07 08:25:54 UTC
http://www.quantenblog.net/security/virus-scanner-bypass
See url, patch with fix is here:
http://cvsweb.clamav.net/bin/cgi/viewvc.cgi/clamav-devel/libclamav/message.c?r1=1.191&r2=1.192
(applies to both 0.88.x and 0.90rcx)
Comment 1 Tavis Ormandy (RETIRED) gentoo-dev 2006-12-07 09:22:12 UTC
Reassigning to antivirus team, the security team doesnt usually handle bugs of class "anti-virus bypass".
Comment 2 Andrej Kacian (RETIRED) gentoo-dev 2006-12-10 02:59:12 UTC
I have a fix that makes clamav detect the virus in nested base64-encoded attachments. However, this is only part of the problem - if enough nestings are used, clamd crashes.

This is being solved in security bug #157698, marking this one as dupe as not to duplicate effort.

*** This bug has been marked as a duplicate of 157698 ***