Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Chocolatey package held in review due to too many false virus detection positives #61

Closed
ronaldtse opened this issue Oct 8, 2021 · 12 comments
Assignees
Labels
bug Something isn't working

Comments

@ronaldtse
Copy link
Contributor

https://community.chocolatey.org/packages/metanorma/1.4.17.20211007#virus
Screenshot 2021-10-08 at 11 42 06 AM

Because our score is either 7 or 8 (tried a couple runs on virustotal.com), it is automatically held up preventing release:
https://www.virustotal.com/gui/file/d006fd078d8c73d0b13a77196944180f6c5cee2b7aeb74240bb5223251210a87?nocache=1

While these are all unknown virus scanners we might still want to remove/update the files that have been falsely flagged as malicious.
Screenshot 2021-10-08 at 11 43 29 AM

The problematic files are:

  • cve-2017-6419-lzx-negative-spaninfo.chm
  • stub.exe
  • stubw.exe
  • edicon.exe
  • lzma.exe

Is it possible for us to remove or modify these files?

The actual scores are:
Screenshot 2021-10-08 at 11 40 51 AM
Screenshot 2021-10-08 at 11 41 00 AM
Screenshot 2021-10-08 at 11 41 14 AM
Screenshot 2021-10-08 at 11 41 25 AM

@ronaldtse ronaldtse added the bug Something isn't working label Oct 8, 2021
@ronaldtse
Copy link
Contributor Author

@ronaldtse
Copy link
Contributor Author

All of these files are from Ocra. Maybe some malicious executables are built with Ocra, and the Ocra files get tagged?

@CAMOBAP
Copy link
Contributor

CAMOBAP commented Oct 8, 2021

@ronaldtse probably, let me check

@ronaldtse
Copy link
Contributor Author

Found the original issue at Ocra: larsch/ocra#175

@ronaldtse
Copy link
Contributor Author

Found the offending chm file:
https://github.com/kyz/libmspack/blob/master/libmspack/test/test_files/chmd/cve-2017-6419-lzx-negative-spaninfo.chm

This file is provided in libmspack which is included via the ruby-libmspack gem (https://github.com/davispuh/ruby-libmspack)

@ronaldtse
Copy link
Contributor Author

We've forked Ocra at https://github.com/metanorma/ocra to attempt fixing these issues, and will contribute back if they work...

@CAMOBAP
Copy link
Contributor

CAMOBAP commented Nov 6, 2021

@ronaldtse It doesn't look like we can do anything about it. We cannot get rid of lzma.exe because it used for decompression.

Regarding cve-2017-6419-lzx-negative-spaninfo.chm we can just remove it from installed gem before ocra run. But this is a probably single what we can done

@ronaldtse
Copy link
Contributor Author

@CAMOBAP we will be able to resolve the issues with Orca when we switch to Tebako.

However for libmspack - why does this test file get into ruby-libmspack gem? Only the compiled artifact (only the .so file?) should be included in the ruby-libmspack gem.

@ronaldtse ronaldtse moved this to Triage in Metanorma Nov 14, 2021
@ronaldtse ronaldtse moved this from Triage to High priority in Metanorma Nov 14, 2021
@ronaldtse
Copy link
Contributor Author

ronaldtse commented Nov 15, 2021

As requested here by the Chocolatey admins of our package, #64 (comment)

False positives

All "positives" at VirusTotal for the Metanorma package are false positives, from these engines:

  • DrWeb
  • SecureAge APEX
  • VBA32
  • Antiy-AVL
  • Ikarus
  • NANO-Antivirus
  • Gridinsoft
  • Jiangmin

Quite a few of them I've never even heard of: Antiy-AVL, Ikarus, NANO-Antivirus, Gridinsoft, Jiangmin.

@CAMOBAP has used DrWeb, SecureAge APEX, VBA32 before.

We maintain that the value of an anti-virus scan is about quality - not quantity.

Analysis of false positives

Here's an analysis of every false positive file.

  1. cve-2017-6419-lzx-negative-spaninfo.chm. This file originates from the libmspack library's test suite.
  1. stub.exe. Compiled as part of the Orca package as the launcher.
  1. stubw.exe: same as stub.exe but built with -mwindows flag instead of -D_CONSOLE flag.
  1. edicon.exe: Compiled as part of the Orca package as the icon holder.
  1. lzma.exe: This is the LZMA executable from 7-zip: https://www.7-zip.org/sdk.html

I hope this is sufficient for the admins.

@CAMOBAP
Copy link
Contributor

CAMOBAP commented Nov 15, 2021

I will update description

@CAMOBAP
Copy link
Contributor

CAMOBAP commented Nov 15, 2021

Resubmited

@CAMOBAP CAMOBAP moved this from High priority to On hold in Metanorma Nov 18, 2021
@CAMOBAP
Copy link
Contributor

CAMOBAP commented Nov 20, 2021

VirusScan doesn't a problem anymore

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Projects
None yet
Development

No branches or pull requests

2 participants