Koozali.org: home of the SME Server

Win.Exploit.CVE_2016_3316-1

Offline hawk

  • *
  • 141
  • +0/-0
    • hawkelectronics
Win.Exploit.CVE_2016_3316-1
« on: August 10, 2016, 01:36:30 PM »
hi
A problem i have picked up today with a virus, just asking if anyone else had the same issue how you might have resolved the issue,
i first noticed when trying to send an email with a doc attachement, the server rejected the mail saying it has the
Win.Exploit.CVE_2016_3316-1 virus. then i got calls from some my clients with the same issue.
So freeking out i load some AV's and ran scans on my computer nothing, ran scans on my ibays that have docs. nothing
I downloaded the latest clamwin and scanned, bingo hundreds of Doc files with the virus.
So i am assuming this could be one of these false - positives , if i create a new doc with either libre or word with nothing in the doc it scans as having the virus.

What is worring me is that sme using clam to scan will be rejecting all emails with a doc attachemnt and when the clam runs its server scan it will quarantee all the doc files.

Anyone having the same issue?
thanks
john

Offline warren

  • *
  • 293
  • +0/-0
Re: Win.Exploit.CVE_2016_3316-1
« Reply #1 on: August 10, 2016, 02:09:15 PM »
Hi hawk
Got same.

I did following : ( add / whitelist signature to clamav )

Code: [Select]
# echo "Win.Exploit.CVE_2016_3316-1" >> /var/clamav/local.ign2
# chown clamav:clamav /var/clamav/local.ign2
# service clamd restart

Re-sent test email and it came through.

Offline hawk

  • *
  • 141
  • +0/-0
    • hawkelectronics
Re: Win.Exploit.CVE_2016_3316-1
« Reply #2 on: August 10, 2016, 03:41:14 PM »
Hi Warren
Worked perfectly,
thanks

guest22

Re: Win.Exploit.CVE_2016_3316-1
« Reply #3 on: August 10, 2016, 03:42:39 PM »
all suspected security issues should be reported to security@contribs.org

Offline hawk

  • *
  • 141
  • +0/-0
    • hawkelectronics
Re: Win.Exploit.CVE_2016_3316-1
« Reply #4 on: August 10, 2016, 04:18:08 PM »
ok have sent to security
thanks

Offline warren

  • *
  • 293
  • +0/-0
Re: Win.Exploit.CVE_2016_3316-1
« Reply #5 on: August 10, 2016, 04:23:56 PM »
all suspected security issues should be reported to security@contribs.org

Agreed... but think this is more a false-positive issue from clamav  from the mailing lists : http://lists.clamav.net/pipermail/clamav-users/2016-August/003237.html
Quote
Alain Zidouemba azidouemba at sourcefire.com
Wed Aug 10 09:52:29 EDT 2016

    Previous message (by thread): [clamav-users] False Positive - Win.Exploit.CVE_2016_3316-1?
    Next message (by thread): [clamav-users] False Positive - Win.Exploit.CVE_2016_3316-1?
    Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]

The offending signature has been dropped from the signature set. This
should be reflected shortly in an upcoming signature update.

- Alain

On Wed, Aug 10, 2016 at 6:10 AM, Al Varnell <alvarnell at mac.com> wrote:


ok have sent to security
thanks


Thanks

Offline CharlieBrady

  • *
  • 6,918
  • +3/-0
Re: Win.Exploit.CVE_2016_3316-1
« Reply #6 on: August 10, 2016, 04:37:06 PM »
all suspected security issues should be reported to security@contribs.org

I don't see how this would be a security issue. It sounds just to be a false positive virus detection.

Offline Catton

  • *
  • 36
  • +0/-0
Re: Win.Exploit.CVE_2016_3316-1
« Reply #7 on: August 10, 2016, 06:56:05 PM »
Yes, this happened to me too. I added Win.Exploit.CVE_2016_3316-1 to the clamav white-list . that worked. When I ran a clamscan on /var/spool/clamav/quarantine/, I no longer see FOUND Win.Exploit.CVE_2016_3316-1.
I there a way put the false positive files in quarantine back to their original locations. Perhaps someone already has a script.

Offline Catton

  • *
  • 36
  • +0/-0
Re: Win.Exploit.CVE_2016_3316-1
« Reply #8 on: August 10, 2016, 07:19:15 PM »