-
Notifications
You must be signed in to change notification settings - Fork 237
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
c99.php is not detected. Signatures out of date? #411
Comments
By default maldet will ignore files owned as root as to prevent system damage from automatic quarantine. So change the ownership of the files before the scan or change the scan_ignore_root setting in the maldet config. |
@Gazoo thanks. but this is non-default setup.... |
Downloading and unpackaging archives as root from untrusted sources is pretty risky behavior, please be careful! Please try any scans similar to this in the future with Thank you |
@rfxn Thanks for your reply. In fact I just put my collection of shells into the test dir and found that one shell from the collection was not detected. After that I crafted two test cases, validated them and posted here. So the issue is not about a CLI key scan_ignore_root - it is about the fact that maldet does detects r57 and doesn't detect c99. |
Understood; thank you for the quick follow-up. I'm working on cutting a new release and will evaluate the c99 rules, specifically the sample archives you are linking. |
malware hits 0, cleaned hits 0, time 4s
For example r57 is successfully detected even in rar archive so the scanner configuration is ok, something is wrong with the signatures :
malware hits 1, cleaned hits 0, time 4s
The text was updated successfully, but these errors were encountered: