Re: [Clamav-users] ClamAV Vulnerability

2007-11-21 Thread G.W. Haywood
Hi there, On Tue, 13 Nov 2007 David F. Skoll wrote: > ...I think on-by-default code that is inefficient, badly-written, a > source of false-positives and of dubious value in a virus-scanner is > pretty important to discuss. and on Wed, 21 Nov 2007 David F. Skoll wrote: > Clam has a rather check

Re: [Clamav-users] Can't connect to UNIX socket

2007-11-21 Thread Morgan Walker
First off, thanks for all your help guys. It turns out patience was my worst enemy. It took more than 5-10 minutes for clamd to start up and create the socket. All is well now, guess its time to upgrade clamav. Thanks again, Morgan -Original Message- From: [EMAIL PROTECTED] [mailto:[E

Re: [Clamav-users] ClamAV Vulnerability

2007-11-21 Thread David F. Skoll
G.W. Haywood wrote: >> Clam has a rather checkered security history, and some of its code >> is pretty convoluted. > Tomasz isn't the only one who finds this boring. Please either make a > positive contribution or find another list on which to make trouble. I have contributed (financially and a

Re: [Clamav-users] Unknown Signature

2007-11-21 Thread Derick Centeno
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Thanks Noel. I've got to do more thinking on your explanation but I wanted to express appreciation for your time. On Mon, 19 Nov 2007 16:08:06 -0600 Noel Jones <[EMAIL PROTECTED]> wrote: > Derick Centeno wrote: > > -BEGIN PGP SIGNED MESSAGE-

Re: [Clamav-users] Where is the correct place to request features?

2007-11-21 Thread aCaB
gypsy wrote: > I have posted to the Wiki in vain. Where is the correct place to post a > request for a feature? https://wwws.clamav.net/bugzilla/ Please mark your "bug" report as "enhancement". -aCaB ___ Help us build a comprehensive ClamAV guide: vis

Re: [Clamav-users] ClamAV Vulnerability

2007-11-21 Thread John Rudd
G.W. Haywood wrote: > > Please either make a > positive contribution or find another list on which to make trouble. He IS trying to make a positive contribution. He's trying to establish a best practice that fits for any production environment where the sysadmins care about their quality of

Re: [Clamav-users] ClamAV Vulnerability

2007-11-21 Thread Christoph Cordes
Am 20.11.2007 um 11:06 schrieb Sean Doherty: > Anyone know if there is any substance to this vulnerability claim? > > http://wabisabilabi.blogspot.com/2007/11/focus-on-clamav-remote- > code-execution.html No. -- Best regards, Christoph ___ Help

Re: [Clamav-users] Phishing feature defaults, naming, and 0.92

2007-11-21 Thread David F. Skoll
Christoph Cordes wrote: > - after a new release ClamAV should mimic the behavior of the > preceding version by default unless it's a major release (.x0) or the > user enabled possible new features explicitly. furthermore the > default behavior should be as conservative as possible. Did i get

Re: [Clamav-users] Phishing feature defaults, naming, and 0.92

2007-11-21 Thread Steve Wray
Christoph Cordes wrote: > Hello, > > so in the end it boils down to this: > > - after a new release ClamAV should mimic the behavior of the > preceding version by default unless it's a major release (.x0) or the > user enabled possible new features explicitly. furthermore the > default beha

Re: [Clamav-users] Phishing feature defaults, naming, and 0.92

2007-11-21 Thread Christoph Cordes
Hello, so in the end it boils down to this: - after a new release ClamAV should mimic the behavior of the preceding version by default unless it's a major release (.x0) or the user enabled possible new features explicitly. furthermore the default behavior should be as conservative as possib

Re: [Clamav-users] ClamAV Vulnerability

2007-11-21 Thread Tomasz Kojm
On Tue, 20 Nov 2007 12:06:00 +0200 Sean Doherty <[EMAIL PROTECTED]> wrote: > Anyone know if there is any substance to this vulnerability claim? > > http://wabisabilabi.blogspot.com/2007/11/focus-on-clamav-remote-code-execution.html > Just to make you feel better - ClamAV includes two special me

Re: [Clamav-users] ClamAV Vulnerability

2007-11-21 Thread Steve Wray
Christoph Cordes wrote: > Am 20.11.2007 um 11:06 schrieb Sean Doherty: > >> Anyone know if there is any substance to this vulnerability claim? >> >> http://wabisabilabi.blogspot.com/2007/11/focus-on-clamav-remote- >> code-execution.html > > No. Ok, slight ambiguity here. On the face of it you

Re: [Clamav-users] Phishing feature defaults, naming, and 0.92

2007-11-21 Thread Dennis Peterson
Steve Wray wrote: > Christoph Cordes wrote: >> Hello, >> >> so in the end it boils down to this: >> >> - after a new release ClamAV should mimic the behavior of the >> preceding version by default unless it's a major release (.x0) or the >> user enabled possible new features explicitly. further

Re: [Clamav-users] ClamAV Vulnerability

2007-11-21 Thread Christoph Cordes
Am 22.11.2007 um 00:45 schrieb Steve Wray: > Christoph Cordes wrote: >> Am 20.11.2007 um 11:06 schrieb Sean Doherty: >> >>> Anyone know if there is any substance to this vulnerability claim? >>> >>> http://wabisabilabi.blogspot.com/2007/11/focus-on-clamav-remote- >>> code-execution.html >> >> No.

Re: [Clamav-users] ClamAV Vulnerability

2007-11-21 Thread David F. Skoll
Tomasz Kojm wrote: > Just to make you feel better - ClamAV includes two special mechanisms > that in almost all cases allow us to remotely address such vulnerabilities in > 5 minutes eliminating the need for urgent update of the entire package. These > special features effectively limit wider usag

Re: [Clamav-users] ClamAV Vulnerability

2007-11-21 Thread Christoph Cordes
Am 22.11.2007 um 01:54 schrieb David F. Skoll: > >> Just to make you feel better - ClamAV includes two special mechanisms >> that in almost all cases allow us to remotely address such >> vulnerabilities in >> 5 minutes eliminating the need for urgent update of the entire >> package. These >>

Re: [Clamav-users] Phishing feature defaults, naming, and 0.92

2007-11-21 Thread jef moskot
On Thu, 22 Nov 2007, Christoph Cordes wrote: > - after a new release ClamAV should mimic the behavior of the preceding > version by default unless it's a major release (.x0) or the user enabled > possible new features explicitly. furthermore the default behavior > should be as conservative as possi

Re: [Clamav-users] ClamAV Vulnerability

2007-11-21 Thread Tomasz Kojm
On Wed, 21 Nov 2007 19:54:17 -0500 "David F. Skoll" <[EMAIL PROTECTED]> wrote: > Tomasz Kojm wrote: > > > Just to make you feel better - ClamAV includes two special mechanisms > > that in almost all cases allow us to remotely address such > > vulnerabilities in 5 minutes eliminating the need for

Re: [Clamav-users] ClamAV Vulnerability

2007-11-21 Thread David F. Skoll
Christoph Cordes wrote: > If a severe vulnerability is discovered in one of the ClamAV modules > - like if one of the unpackers for PE files or something like that > and it offers the possibility to compromise the systems security, the > team can deactivate the module for certain releases wi

[Clamav-users] clamav-milter ERROR: Segmen tation fault :-( Bye..

2007-11-21 Thread Ivan Frolov
Hi All! Clamav-milter Segmentation fault wiht this log: LibClamAV Warning: RFC2231 parameter continuations are not yet handled LibClamAV Warning: messageFindArgument: no '=' sign found in MIME header 'filename' (filename*0*=windows-1251''%FD%EB%F2%E5%F5%ED%E8%EA%F1%%20%EF%EE%E7%E4%F0%E0) LibClam