[clamav-users] Heuristics.Broken.Executable FOUND for core files/core dumps
Kris Deugau
kdeugau at vianet.ca
Tue Nov 7 17:05:57 UTC 2017
Ravi wrote:
> Thanks Kris for your comments. Currently we scan the incoming
> files(zips/archives) placed on the local hard drive with the
> clamdscan(which uses clamd daemon), Can you share more info on what you
> meant on handling the result differently if we are using the clamdscan?
Whatever calls clamdscan needs to look at the results in more detail,
and instead of just blindly treating any positive result as a virus,
check the virus "name" to see if there is some other action, or if the
result is something that should be let past.
For instance, I've added checks to several mail systems that treat a
resulting "virus name" of "Heuristics.Phishing.SpoofDomain" differently
from other results, because that test (PhishingScanURLs) tends to FP on
legitimate mail. The test is still valuable but it's not reliable as an
absolute black/white result.
In general, if you don't want certain things to cause false positives
with a content filter, either:
- don't pass those things to the filter in the first place,
- handle the results from the filter differently for your problem case,
- disable the problematic test(s) in the filter
Exactly what changes you need to make for each of these will depend on
how you're passing content to the filter, how you're accepting the scan
results back, and how configurable the filter is.
-kgd
More information about the clamav-users
mailing list