Sure. I will submit but as per clamav Database this signature is already in
database.

Why we should submit sample again?



On Tue, Jul 28, 2015 at 4:58 PM, Alain Zidouemba <azidoue...@sourcefire.com>
wrote:

> Yes, please do so. Submit your sample here:
> http://www.clamav.net/report/report-malware.html and provide the MD5 or
> SHA256 of the sample you submitted as a reply to this email.
>
> Thanks,
>
> - Alain
>
> On Tue, Jul 28, 2015 at 11:01 AM, Al Varnell <alvarn...@mac.com> wrote:
>
> > It does not match the signature for Exploit.PDF.CVE_2009_4324.
> >
> > It’s looking for a two part signature:
> >
> > In your document there are spaces in the string "/S /JavaScript /JS”
> which
> > are not in the signature.
> >
> > Your document contains the string "media.newPlayer(null)” whereas the
> > signature is looking for “this.” in front of it.
> >
> > Submit your document for possible addition of new or revised signature.
>
>
> > -Al-
> >
> >
> >
> > On Tue, Jul 28, 2015 at 03:01 AM, P K wrote:
> > >
> > > Hi Guys,
> > >
> > > Still waiting for an answer.
> > >
> > > On Thu, Jul 23, 2015 at 8:21 PM, P K <pkopen...@gmail.com> wrote:
> > >
> > >> Hi Guys,
> > >>
> > >> I am testing clamav in my local system to detect POST data's from
> > network.
> > >> I am newbie in ClamAv and want to test with real time signatures.
> > >>
> > >> I tested with Eicher Test Signature and it works fine.
> > >>
> > >> *But ClamAv is unable to detect CVE-2009-4324 with pdf.*
> > >>
> > >> I see signature is present in daily.cld and if extracted its present
> in
> > >> daily.ldb.
> > >> Gmail able to detect same pdf as virus.
> > >>
> > >> Any help on what wrong in my ClamAv system and to fix it.
> > >>
> > >> $ clamscan ~/anti/eicar.com.txt
> > >> */home/pk/anti/eicar.com.txt: Eicar-Test-Signature FOUND*
> > >>
> > >> ----------- SCAN SUMMARY -----------
> > >> Known viruses: 3898123
> > >> Engine version: 0.98.6
> > >> Scanned directories: 0
> > >> Scanned files: 1
> > >> Infected files: 1
> > >> Data scanned: 0.00 MB
> > >> Data read: 0.00 MB (ratio 0.00:1)
> > >> Time: 6.480 sec (0 m 6 s)    <--------------- took 6sec to detect
> normal
> > >> virus
> > >>
> > >> $ clamscan ~/anti_new/virus/exploit.pdf
> > >>
> > >> */home/pk/anti_new/virus/exploit.pdf: OK*
> > >> ----------- SCAN SUMMARY -----------
> > >> Known viruses: 3898123
> > >> Engine version: 0.98.6
> > >> Scanned directories: 0
> > >> Scanned files: 1
> > >> Infected files: 0
> > >> Data scanned: 0.00 MB
> > >> Data read: 0.00 MB (ratio 0.00:1)
> > >> Time: 8.100 sec (0 m 8 s)
> > >>
> > >> I generated above virus using this link -
> > >> http://www.decalage.info/exefilter_pdf_exploits
> > >>
> > >> I really want to learn ClamAv virus detection and try to enhance it.
> > >>
> > >> Thanks
> > >> --PK
> > _______________________________________________
> > Help us build a comprehensive ClamAV guide:
> > https://github.com/vrtadmin/clamav-faq
> >
> > http://www.clamav.net/contact.html#ml
> >
> _______________________________________________
> Help us build a comprehensive ClamAV guide:
> https://github.com/vrtadmin/clamav-faq
>
> http://www.clamav.net/contact.html#ml
>
_______________________________________________
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to