[clamav-users] CVE-2017-11241 - Synology DIskStation AV Essentials

Joel Esler (jesler) jesler at cisco.com
Wed Sep 13 12:43:20 UTC 2017


This was taken care of already.  Thanks!


--
Joel Esler | Talos: Manager | jesler at cisco.com<mailto:jesler at cisco.com>






On Sep 12, 2017, at 3:36 PM, Judd Grayzel <judd_grayzel at yahoo.com<mailto:judd_grayzel at yahoo.com>> wrote:

The MD5 of the false positive file that I submitted to the website:MD5 hash of file Standard Job1.xlsx:
eb 28 c5 01 b2 14 91 5a 70 31 59 92 56 9e f6 10

     From: Joel Esler (jesler) <jesler at cisco.com<mailto:jesler at cisco.com>>
To: ClamAV users ML <clamav-users at lists.clamav.net<mailto:clamav-users at lists.clamav.net>>
Sent: Tuesday, September 12, 2017 5:55 AM
Subject: Re: [clamav-users] CVE-2017-11241 - Synology DIskStation AV Essentials

Depends on your operating system, but googling “how do I find the md5 of a file” for your OS should turn of plenty of results.

--
Joel Esler | Talos: Manager | jesler at cisco.com<mailto:jesler at cisco.com><mailto:jesler at cisco.com>






On Sep 11, 2017, at 5:42 PM, Judd Grayzel <judd_grayzel at yahoo.com<mailto:judd_grayzel at yahoo.com><mailto:judd_grayzel at yahoo.com>> wrote:

Where do I get the MD5 for the file?

Sent from my iPhone

On Sep 11, 2017, at 1:42 PM, Joel Esler (jesler) <jesler at cisco.com<mailto:jesler at cisco.com><mailto:jesler at cisco.com>> wrote:

You want to submit some false positives to us via the website, followup here with the md5s of the files you submit, the malware team can take a look.

--
Joel Esler | Talos: Manager | jesler at cisco.com<mailto:jesler at cisco.com><mailto:jesler at cisco.com><mailto:jesler at cisco.com>






On Sep 11, 2017, at 3:06 PM, Judd Grayzel <judd_grayzel at yahoo.com<mailto:judd_grayzel at yahoo.com><mailto:judd_grayzel at yahoo.com><mailto:judd_grayzel at yahoo.com>> wrote:

My Synology Diskstation running the Anti-Virus Essentials (ClamAV based engine) quarantined almost 1000 files for the CVE-2017-11241 vulnerability. This CVE references a problem with Adobe Acrobat, but the files that are being quarantined are Microsoft Excel fIles.
Do these files really have a virus of some sort, or is this a False/Positive situation?
_______________________________________________
clamav-users mailing list
clamav-users at lists.clamav.net<mailto:clamav-users at lists.clamav.net><mailto:clamav-users at lists.clamav.net><mailto:clamav-users at lists.clamav.net>
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

_______________________________________________
clamav-users mailing list
clamav-users at lists.clamav.net
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

_______________________________________________
clamav-users mailing list
clamav-users at lists.clamav.net<mailto:clamav-users at lists.clamav.net>
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

_______________________________________________
clamav-users mailing list
clamav-users at lists.clamav.net
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml


_______________________________________________
clamav-users mailing list
clamav-users at lists.clamav.net
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml



More information about the clamav-users mailing list