ClamAV Detected virus not getting quarantined
Posted: 10 May 2013, 14:10
This may be a bug...
Noticed over the past week that several viruses that are detected by ClamAV as being
PHP Shell Exploits are NOT getting quarantined...
Here is my default cxs config.
/usr/sbin/cxs --allusers --clamdsock /var/clamd --doptions Mv --exploitscan --filemax 10000 --ignore /etc/cxs/cxs.ignore --logfile /var/log/cxs.log --mail root@server.tld --MD5 --options mMOLfSGchexdnwZDR --qoptions Mhv --quarantine /backups/quarantined_by_cxs --report /var/log/cxs.scan --sizemax 500000 --summary --throttle 4 --timemax 30 --virusscan --voptions mfhexT --xtra /etc/cxs/cxs.xtra
And here is the output I got from the email:
cxswatch Scanning /home/USERNAME/public_html/wp-content/themes/twentyeleven/search.php:
# ClamAV detected virus = [PHP.ShellExec] (md5sum:83897c09b14292a9b799dd31823715e2):
'/home/USERNAME/public_html/wp-content/themes/twentyeleven/search.php'
The search.php file (which I looked at and it is indeed a shell exploit) was never quarantined and still in the users directory.
The qurantine options (see above) clearly show "Mhv" (v being virus). It used to quarantine those, but doesn't seem to anymore.
Peter
Noticed over the past week that several viruses that are detected by ClamAV as being
PHP Shell Exploits are NOT getting quarantined...
Here is my default cxs config.
/usr/sbin/cxs --allusers --clamdsock /var/clamd --doptions Mv --exploitscan --filemax 10000 --ignore /etc/cxs/cxs.ignore --logfile /var/log/cxs.log --mail root@server.tld --MD5 --options mMOLfSGchexdnwZDR --qoptions Mhv --quarantine /backups/quarantined_by_cxs --report /var/log/cxs.scan --sizemax 500000 --summary --throttle 4 --timemax 30 --virusscan --voptions mfhexT --xtra /etc/cxs/cxs.xtra
And here is the output I got from the email:
cxswatch Scanning /home/USERNAME/public_html/wp-content/themes/twentyeleven/search.php:
# ClamAV detected virus = [PHP.ShellExec] (md5sum:83897c09b14292a9b799dd31823715e2):
'/home/USERNAME/public_html/wp-content/themes/twentyeleven/search.php'
The search.php file (which I looked at and it is indeed a shell exploit) was never quarantined and still in the users directory.
The qurantine options (see above) clearly show "Mhv" (v being virus). It used to quarantine those, but doesn't seem to anymore.
Peter