Stephen Gran <[EMAIL PROTECTED]> writes:

> Yes, but you'll need to do a fair amount of work :)

So far, this is easier for me than getting permission to
share the file...

> Then, run gdb /usr/bin/clamscan

(gdb) set args temp/badmail
(gdb) break ole2_extract.c:802
No source file named ole2_extract.c.
Make breakpoint pending on future shared library load? (y or [n]) y

Breakpoint 1 (ole2_extract.c:802) pending.
(gdb) run
Starting program: /usr/bin/clamscan temp/badmail
[Thread debugging using libthread_db enabled]
[New Thread 16384 (LWP 18302)]
Breakpoint 2 at 0x4004d435: file ole2_extract.c, line 802.
Pending breakpoint "ole2_extract.c:802" resolved
LibClamAV Error: WARNING: not scanned; untested big block size - please report
temp/badmail: OK

----------- SCAN SUMMARY -----------
Known viruses: 32886
Engine version: 0.84rc1
Scanned directories: 0
Scanned files: 1
Infected files: 0
Data scanned: 0.25 MB
Time: 1.575 sec (0 m 1 s)

Program exited normally.
(gdb) bt full
No stack.

> And send the results.  That will get us farther.  If possible, leave the
> unstripped debs laying around somewhere, as I may ask you to repeat this
> work, but breaking and backtracing at different points.  Sorry to have
> to push the work onto you, but I don't see any other way right now.

No problem...

Michael Below


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to