You are not logged in.
Hi
I run clamscan every week but it has suddenly started to show:
Infected files: 103 with Win.Exploit.CVE_2019_0903-6966169-0
What can I do about this.
I would be grateful for any response on this.
percy
Last edited by percy_vere_uk (2019-05-26 11:12:57)
Offline
What is this system used for? Is it a mail server?
Where are those 103 files in your files system? What type of files are they?
In general, I regard clam as a tool to protect our Windows brethren from exploits in files we serve them from our systems.
Nothing is too wonderful to be true, if it be consistent with the laws of nature -- Michael Faraday
The shortest way to ruin a country is to give power to demagogues.— Dionysius of Halicarnassus
---
How to Ask Questions the Smart Way
Offline
Not a mail server Just used as a desktop system.
They are mainly .pdf files
some .cache/firefox/ wine/usr/share/wine/fonts .mozilla/firefox/
I have recently installed wine.
Offline
Not a mail server Just used as a desktop system.
They are mainly .pdf files
some .cache/firefox/ wine/usr/share/wine/fonts .mozilla/firefox/
I have recently installed wine.
It can probably be exploited through wine. Even though the name implies it's a windows virus.
I may have to CONSOLE you about your usage of ridiculously easy graphical interfaces...
Look ma, no mouse.
Offline
I have recently installed wine.
Was that coincident with these files being flagged as threats?
In general, I would not worry about these files. But I don't have wine on my system. It is not inconceivable that Windows malware could find a toehold through Wine.
Anything in a cache directory can just be deleted.
pdfs can be a threat, but I have had no issues with readers such as evince or okular.
I did a brief search for this exploit and found nothing. It could all just be false positives.
Nothing is too wonderful to be true, if it be consistent with the laws of nature -- Michael Faraday
The shortest way to ruin a country is to give power to demagogues.— Dionysius of Halicarnassus
---
How to Ask Questions the Smart Way
Offline
As it seems that most linux user do not use anti virus software and many use wine then they could have the same problem and not know about it.
What is best to do about it ?
Offline
As it seems that most linux user do not use anti virus software and many use wine then they could have the same problem and not know about it.
What is best to do about it ?
The same exploits may or may not actually have any effect in Linux...some viruses embedded into files get junked and no viruses get activated.
I may have to CONSOLE you about your usage of ridiculously easy graphical interfaces...
Look ma, no mouse.
Offline
We have the same problem today.
Mail server. A lot of email is blocked by the same signature Win.Exploit.CVE_2019_0903-6966169-0
in most cases .pdf files
The problem occurred after the last clamav update
Offline
Thank you both
ewaller and nomorewindo..
I feel a little better about this now the only problem is that each time I run clamscan I will see this Win.Exploit message.
I will try and find a way over this. I might have to re build without wine trouble is I find wine very useful.
I will leave this post open for a while in case any more information is available.
Thank you again.
percy
Offline
Starting from today I am having the same problem on my mail server. ClamAV flags a pdf file as a virus (Win.Exploit.CVE_2019_0903-6966169-0). I am pretty sure it is a false positive as it is a pdf file generated from a simple word text file using a pdf printer. When I check that same file on virustotal no other scanner finds a virus.
I reported that file as a false positive to ClamAV today and I am waiting for a response from them.
Since I don't use wine I don't think it has anything to do with wine.
Offline
Anyone here working for ProtonMail? Because I am transitioning from Gmail to ProtonMail and yesterday evening one message with PDF attached was rejected by ProtonMail with reason above. Nice to know they are probably using ClamAV
Offline
Here's a workaround until ClamAV updates their virus signatures:
Create an entry in the ClamAV whitelist. Just did that for my mailserver, works like a charm.
https://www.clamav.net/documents/how-do … -signature
Offline
Here is a discussion on the clamav mailing list
https://marc.info/?t=155878997100001&r=1&w=2
| alias CUTF='LANG=en_XX.UTF-8@POSIX ' |
Offline
Here's a workaround until ClamAV updates their virus signatures:
Create an entry in the ClamAV whitelist. Just did that for my mailserver, works like a charm.
https://www.clamav.net/documents/how-do … -signature
Thanks for all the input on this folks now I know it is harmless I will wail until ClamAV updates their virus signatures:
percy
Offline