Re: [Clamav-users] Don't know what to do with infected files

2007-03-13 Thread Thomas Sprinkmeier
On Tue, 2007-03-13 at 00:09 +0100, Pascal Duchatelle wrote:
 Thomas Sprinkmeier a écrit :
  Is deleting it enough?
  My advice is to nuke infected systems. Even benign programs rarely
  uninstall cleanly; malware is nasty and designed not to go quietly.
 

 To nuke you mean just reformatting the space and to a re-install ?

Yes.
Remember to install all patches, virus checkers, signature updates etc.
etc. from behind a nice, safe firewall (see
https://isc2.sans.org/survivaltime.html and
http://www.sans.org/rr/papers/index.php?id=1298)

Your system is dual-boot?
Re-installing windows will nuke your bootloader (probably grub or lilo).
You'll have to reinstall it afterwards. Of course, to reinstall it you
gotta boot linux first (chicken and egg :-)
Make a linux boot disk and/or have a live CD (http://www.knoppix.org/)
handy before you start.


 I naively did this unzipping already when I wanted to upgrade the YEPP 
 studio...
 The sum of the folders  + files sizes looks about the same as the size 
 of the zip archive. Could it be a false positive ?

sounds like it.
Consider submitting the file to clamav, they're likely to be interested.

 
 Thank you again
 
 Pascal

glad to help.


Thomas

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Don't know what to do with infected files

2007-03-12 Thread Thomas Sprinkmeier
On Mon, 2007-03-12 at 11:31 +0100, Pascal Duchatelle wrote:
 Hi there,
 
 sorry to bother you but I am new to ClamAV (on fedora core 6). I ran 
 clamscan on my laptop and got a message telling me that I have 3 files 
 infected.
 One is in my mail . I browed the FAQ and find a way supposed (by using 
 the --debug option) to tell the number of the infected message so that I 
 could get rid of it.
 First : I ran the clamscan --debug -l fich -r / command in a 
 console. Where should I find the line telling me which of my messages is 
 infected ? In the console or ine the fich file given in the command ? 
 But maybe it does not work with thunderbird.
 If it is in the console, then I have another problem because during the 
 debug process there are a bunch of info scroling down the screeen at 
 incredible speed, and after a moment I don't know why but the characters 
 go wild (except numbers) so that I cannot read anything on the screen.
 Of course I could delete the entire content of the mail box (by the way 
 would it be enough action taken ? because nowhere in the manual it is 
 said how to handle infected files (although in the FAQ it is hinted that 
 desinfecting such files would be mainly a waste of energy...) ). This 
 would waste me a lot of valuable messages that I keep, but more I would 
 not know where the infected message comes from (for future precaution).

You could split it into separate messages using formail, scan the
individual messages and then recombine the uninfected ones.

Alternatively you could use a MUA to split your mail into 2 folders,
scan them, split the infected one. ye olde binary search :-)


 The second file infected is in my windows partition under the root 
 directory (I got this result :media/hda2/pagefile.sys: 
 Exploit.HTML.MHTRedir-8 FOUND). hda2 is my windows partition.  This file 
 is 1.3G large (from what nautilus sees/says). Again is simply deleting 
 enough ? I s it usually a windows file ?

pagfile.sys is your swap file. If your virus was ever swapped out, it'd
make sense to find it there. 

You should be able to delete it, windows will recreate it.
You need to turn off swap first, (probably) reboot, delete the file,
turn swap back on and reboot again.

Is deleting it enough?
My advice is to nuke infected systems. Even benign programs rarely
uninstall cleanly; malware is nasty and designed not to go quietly.

 The third one is more confusing to me since it is a zipped file that I 
 donwloaded from the US Samsung site when I tried to upgrade my Yepp 920 
 studio and firmware (mp3 player interface). The scan tells me that it is 
 an oversized archive. Is there a way for clamAV to be sure of that (I 
 mean in a MD5 sum sort of way) ? Because it is only 50Mo.

oversized archives are also known as compression bombs. You take a
file with a few gazzilion NULL's (easy to do on a filesystem with sparse
file support) and compress it.
The victim tries to unzip it to check for viruses and nukes their free
disk space.

I don't know which exactly how clamAV check for these, but sometimes
inncent files are tagged (files that really do have fantastic
compression ratios).

Unzip the file (preferably to a safe partition) and scan the resultant
files.

 
 Thank you for your responses and advices.
 


Thomas

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] How to make ClamAV scan incoming email received by qmail on Plesk

2007-03-10 Thread Thomas Sprinkmeier
On Sat, 2007-03-10 at 20:20 -0800, Dennis Peterson wrote:
 fcgmail wrote:
 
  
  And also if it's made to work with qmail, how can i make it not to scan 
  outgoing email?
  
  Any hint will be greatly appreciated!
 
 If you checked your outgoing mail I wouldn't have to check it when it 
 gets to my server. The only reason I have to check other people's mail 
 at all is because they don't.

Most virus emails don't come from servers but from worm-farms. Even if
all emails did come from servers, it only takes one bad server ...

I'll check my incoming mail regardless, thanks.

Not wanting to scan outgoing mail is a puzzling requirement though.
Unless you're really strapped for performance, why not?
If it is a performance issue then either upgrade your tired old 286 or
you're handling so much mail that you shouldn't have to ask how set it
up. (Sorry, don't mean to sound harsh)

If you really only want to scan incoming mail one way to do that is with
procmail; just set up a global rule /etc/procmailrc:

LOGFILE=/tmp/procmail.global.$LOGNAME.`/bin/date +%Y.%m%d`.log
SHELL=/bin/bash
SUBJECT=`formail -xSubject:`

:0fw: virus.lock
|/usr/local/bin/clamscan-procfilter.pl

:0fw
* ^X-CLAMAV
|/usr/bin/formail -i Subject: [CLAMAV VIRUS ALERT] ${SUBJECT}


Thomas

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html