Bug 489116

Summary: amavisd-new: failure to detect message with multiple virus payloads as infected
Product: [Other] Security Response Reporter: Vincent Danen <vdanen>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: bressers, steve
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2010-03-22 18:10:43 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Vincent Danen 2009-03-07 19:37:09 UTC
An issue with amavisd-new was reported where a message that contains multiple virus payloads is not considered infected, but clean (although amavisd-new detects the virus payloads in the message).

This was reported to Debian: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=518524

Upon looking at the fix for Debian's configuration file, it looks like this is due to some regexps not being updated for perl 5.10.  Their fix is here:

http://hg.debian.org/hg/amavisd-new/head?cs=83c606676885;style=gitweb

Looking at the configuration file we ship, this would affect us as well considering we are using perl 5.10 in Fedora 9 and 10.

The analysis in the bug report indicates this should be severity low due to the fact that this would be an uncommon scenario when clamav is used since the detectable payload usually only shows up in the message once.  It also seems to be triggered when keep_decoded_original_maps and decode_parts are enabled.