On Friday 20 October 2017 02:06:38 Al Varnell wrote:

> I assume we are all still talking about
> Html.Exploit.CVE_2017_8750-6336209-0?
>
> Gene, I believe your report was an omni.ja files infected with
> Html.Exploit.CVE_2017_8757-6336185-0.
>
Since it was the same file, I suppose I missed that the CVE had changed.
Anyway, its the above number I've been looking at every morning for a 
couple weeks. I figured my previous msg was sufficient. My bad.

> They have both been dealt with locally by ClamXAV, but I've not seen
> either listed as dropped by ClamAV yet.
>
> Different versions of Firefox on different platforms.
>
> -Al-
>
> On Thu, Oct 19, 2017 at 10:24 PM, Gene Heskett wrote:
> > On Friday 20 October 2017 00:24:20 Tsutomu Oyamada wrote:
> >> Hi,
> >>
> >> The false positive for omni.ja is still ocurring.
> >> I have been reported this many times, but it has not fixed yet.
> >>
> >> I have been troubled with this issue.
> >> What am I supposed to do?
> >
> > I too have reported this, but nothing is being done.
> >
> >> On Sat, 23 Sep 2017 09:53:30 -0400
> >>
> >> Gene Heskett <ghesk...@shentel.net <mailto:ghesk...@shentel.net>> 
wrote:
> >>> On Saturday 23 September 2017 03:59:17 Al Varnell wrote:
> >>> note correction in subject file location
> >>>
> >>>> So here are the facts with regard to
> >>>> Html.Exploit.CVE_2017_8750-6336209-0 (which is not the same as
> >>>> previously reported in this thread). It was just added to the
> >>>> database about fifteen hours ago in daily - 23863 and is looking
> >>>> for two strings which you can observer by using the following
> >>>> (I'm not posting it here so this e-mail won't be detected as
> >>>> infected):
> >>>>
> >>>> sigtool -fHtml.Exploit.CVE_2017_8750-6336209-0|sigtool
> >>>> --decode-sigs
> >>>>
> >>>> CVE-2017-8750 is described as
> >>>> <https://nvd.nist.gov/vuln/detail/CVE-2017-8750
> >>>> <https://nvd.nist.gov/vuln/detail/CVE-2017-8750>>: "Internet
> >>>> Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1,
> >>>> Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, and
> >>>> Microsoft Edge and Internet Explorer in Windows 10 Gold, 1511,
> >>>> 1607, 1703, and Windows Server 2016 allow an attacker to execute
> >>>> arbitrary code in the context of the current user due to the way
> >>>> that Microsoft browsers access objects in memory, aka "Microsoft
> >>>> Browser Memory Corruption Vulnerability"."
> >>>>
> >>>> so it's not a threat to your platform unless you are also running
> >>>> Windows somehow.
> >>>
> >>> I've a bounty on windows here, nuke on encounter.
> >>>
> >>>> My power just came back so I scanned my Firefox 55.0.3 for Mac
> >>>> and it tested clean. Taking a look at the omni.ja file I see 109
> >>>> occurrences of the first string, but not the second.
> >>>>
> >>>> So at this point I'll just repeat my advise from before to submit
> >>>> that file to <http://www.clamav.net/reports/fp
> >>>> <http://www.clamav.net/reports/fp>> then return here and report a
> >>>> hash value.
> >>>
> >>> Means to determine hash? I'll assume sha256sum here
> >>>
> >>> gene@coyote:~/firefox/browser$ sha256sum omni.ja
> >>> 2dafa74b0c099130313a9375d433f6d93fb8f672f1620e28221b6573ed0ae348
> >>> omni.ja
> >>>
> >>> Thanks Al
> >>>
> >>>> On Sat, Sep 23, 2017 at 12:12 AM, Gene Heskett wrote:
> >>>>> On Saturday 23 September 2017 02:32:48 Al Varnell wrote:
> >>>>>> Power out here so cannot check. Was negative when I looked at
> >>>>>> macOS version last week.
> >>>>>>
> >>>>>> What OS?
> >>>>>
> >>>>> 32 bit wheezy,on an AMD phenom, all up to date. uname -a
> >>>>>
> >>>>> 3.16.0-0.bpo.4-amd64 #1 SMP Debian 3.16.39-1+deb8u1~bpo70+1
> >>>>> (2017-02-24) x86_64 GNU/Linux
> >>>>>
> >>>>> Thank you Al.
> >>>>>
> >>>>>> Sent from my iPhone
> >>>>>>
> >>>>>> -Al-
> >>>>>
> >>>>> Cheers, Gene Heskett
> >>>>
> >>>> -Al-
> >>>
> >>> Cheers, Gene Heskett
> >>> --
> >>> "There are four boxes to be used in defense of liberty:
> >>> soap, ballot, jury, and ammo. Please use in that order."
> >>> -Ed Howdershelt (Author)
> >>> Genes Web page <http://geneslinuxbox.net:6309/gene
> >>> <http://geneslinuxbox.net:6309/gene>>
> >>> _______________________________________________
> >>> clamav-users mailing list
> >>> clamav-users@lists.clamav.net
> >>> <mailto:clamav-users@lists.clamav.net>
> >>> http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users
> >>>
> >>>
> >>> Help us build a comprehensive ClamAV guide:
> >>> https://github.com/vrtadmin/clamav-faq
> >>>
> >>> http://www.clamav.net/contact.html#ml
> >>
> >> _______________________________________________
> >> clamav-users mailing list
> >> clamav-users@lists.clamav.net
> >> <mailto:clamav-users@lists.clamav.net>
> >> http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users
> >>
> >>
> >> Help us build a comprehensive ClamAV guide:
> >> https://github.com/vrtadmin/clamav-faq
> >>
> >> http://www.clamav.net/contact.html#ml
> >
> > Cheers, Gene Heskett
>
> -Al-


Cheers, Gene Heskett
-- 
"There are four boxes to be used in defense of liberty:
 soap, ballot, jury, and ammo. Please use in that order."
-Ed Howdershelt (Author)
Genes Web page <http://geneslinuxbox.net:6309/gene>
_______________________________________________
clamav-users mailing list
clamav-users@lists.clamav.net
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to