This repository has been archived on 2024-04-08. You can view files and clone it, but cannot push or open issues or pull requests.
deb-mbse/saved-mbsebbs-code-2/lib/virscan.c

397 lines
10 KiB
C
Raw Normal View History

/*****************************************************************************
*
* Purpose ...............: Scan a file for virusses
*
*****************************************************************************
* Copyright (C) 1997-2011
*
* Michiel Broek FIDO: 2:280/2802
* Beekmansbos 10
* 1971 BV IJmuiden
* the Netherlands
*
* This file is part of MBSE BBS.
*
* This BBS is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License as published by the
* Free Software Foundation; either version 2, or (at your option) any
* later version.
*
* MBSE BBS is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with MBSE BBS; see the file COPYING. If not, write to the Free
* Software Foundation, 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA.
*****************************************************************************/
#include "../config.h"
#include "mbselib.h"
extern pid_t mypid;
/*
* ClamAV stream check.
* Original written bu Laurent Wacrenier as part of the
* clamd-stream-client.
* Returns: 0 = Ok, no virus found.
* 1 = Virus found.
* 2 = Internal error.
*/
int clam_stream_check(char *servname, char *servport, char *filename)
{
struct sockaddr_in sa_in;
struct addrinfo hints, *res = NULL, *p;
int s, ss, buf_len = 0, err;
char buf[1024], *buf_c, *port_s, *ipver = NULL, ipstr[INET6_ADDRSTRLEN];
FILE *fp;
Syslog('f', "clam_stream_check(%s, %s, %s)", servname, servport, filename);
memset(&hints, 0, sizeof(hints));
hints.ai_family = AF_UNSPEC;
hints.ai_socktype = SOCK_STREAM;
if ((err = getaddrinfo(servname, servport, &hints, &res)) != 0) {
WriteError("getaddrinfo(%s:%s): %s\n", servname, servport, gai_strerror(err));
return 2;
}
for (p = res; p != NULL; p = p->ai_next) {
void *addr;
if (p->ai_family == AF_INET) {
struct sockaddr_in *ipv4 = (struct sockaddr_in *)p->ai_addr;
addr = &(ipv4->sin_addr);
ipver = (char *)"IPv4";
} else {
struct sockaddr_in6 *ipv6 = (struct sockaddr_in6 *)p->ai_addr;
addr = &(ipv6->sin6_addr);
ipver = (char *)"IPv6";
}
inet_ntop(p->ai_family, addr, ipstr, sizeof ipstr);
Syslog('+', "Trying %s %s port %s", ipver, ipstr, servport);
if ((s = socket(p->ai_family, p->ai_socktype, p->ai_protocol)) == -1) {
WriteError("$socket()");
return 2;
}
if (connect(s, p->ai_addr, p->ai_addrlen) == -1) {
WriteError("$connect %s port %s", ipstr, servport);
p = p->ai_next;
close(s);
} else {
break;
}
}
if (p == NULL) {
WriteError("unable to connect to %s", servname);
return 2;
}
#define COMMAND "STREAM\r\n"
Syslog('f', "snd: %s", printable((char *)COMMAND, 0));
if (write(s, COMMAND, sizeof(COMMAND)-1) == -1) {
WriteError("$write()");
return 2;
}
if ((buf_len = read(s, buf, sizeof(buf)-1)) == -1) {
WriteError("$read()");
return 2;
}
Syslog('f', "got: %s", printable(buf, 0));
buf[buf_len] = 0;
if (strncasecmp(buf, "PORT ", sizeof("PORT ") -1) != 0) {
return 2;
}
port_s = buf + sizeof("PORT ") -1;
while(*port_s == ' ') port_s ++;
memcpy(&sa_in, res->ai_addr, sizeof(sa_in));
sa_in.sin_port = htons(strtoul(port_s, NULL, 10));
sa_in.sin_family = AF_INET;
ss = socket(PF_INET, SOCK_STREAM, 0);
if (ss == -1) {
WriteError("$socket()");
return 2;
}
sa_in.sin_port = htons(strtoul(port_s, NULL, 10));
if (connect(ss, (struct sockaddr *)&sa_in, sizeof(struct sockaddr_in)) == -1) {
WriteError("$connect2()");
return 2;
}
if ((fp = fopen(filename, "r")) == NULL) {
WriteError("$can't open %s", filename);
return 2;
}
while ((buf_len = fread(buf, 1, sizeof(buf), fp)) > 0) {
if (write(ss, buf, buf_len) == -1) {
if (errno == EPIPE)
break;
WriteError("$write2()");
fclose(fp);
return 2;
}
}
if (buf_len == 0 && ferror(fp)) {
WriteError("$read2()");
return 2;
}
close(ss);
fclose(fp);
if ((buf_len = read(s, buf, sizeof(buf)-1)) == -1) {
WriteError("$read3()");
return 2;
}
buf[buf_len] = 0;
Syslog('f', "res: %s", printable(buf, 0));
/* fwrite(buf, 1, buf_len, stderr); */
buf_c = buf + buf_len;
while(*buf_c=='\r' || *buf_c == '\r' || *buf_c == ' ')
*buf_c --;
if (buf_c - buf >= sizeof(" FOUND") && strncasecmp(buf_c - sizeof(" FOUND"), " FOUND", sizeof(" FOUND")-1) == 0) {
char *buf_s = buf;
buf_c -= sizeof(" FOUND");
if (strncasecmp(buf_s, "stream:", sizeof("stream:")-1) == 0) {
buf_s += sizeof("stream:")-1;
while(*buf_s == ' ')
buf_s ++;
WriteError("ClamAV stream check, virus found: %.*s", (int)(buf_c - buf_s), buf_s);
}
return 1;
}
close(s);
Syslog('f', "clam_stream_check(): no virus found");
return 0;
}
/*
* F-Prot stream check.
* Returns: 0 = Ok, no virus found.
* 1 = Virus found.
* 2 = Internal error.
*
* telnet localhost 10200
* SCAN FILE /path/to/file SIZE n
* stream data
* --
* receive:
* n <descriptive text> <name of the scanned object>
* n -= result code, 0 s clean.
*/
int fp_stream_check(char *server, char *port, char *filename)
{
struct addrinfo hints, *res;
int filesize = 0, buf_len = 0, s, err;
char *cmd, buf[1024], *str1, *str2;
FILE *fp;
Syslog('f', "fp_stream_check(%s, %s, %s)", server, port, filename);
filesize = file_size(filename);
memset(&hints, 0, sizeof(hints));
hints.ai_family = PF_INET;
hints.ai_socktype = SOCK_STREAM;
if ((err = getaddrinfo(server, port, &hints, &res)) != 0) {
WriteError("getaddrinfo(%s:%s): %s\n", server, port, gai_strerror(err));
return 2;
}
while (res) {
s = socket(PF_INET, SOCK_STREAM, 0);
if (s == -1) {
WriteError("$socket()");
return 2;
}
if (connect(s, res->ai_addr, sizeof(struct sockaddr)) == -1) {
struct sockaddr_in *sa = (struct sockaddr_in *)res->ai_addr;
WriteError("$connect(%s:%d)", inet_ntoa(sa->sin_addr), (int)ntohs(sa->sin_port));
res = res->ai_next;
close(s);
} else {
break;
}
}
if (res == NULL) {
WriteError("unable to connect to %s", server);
return 2;
}
cmd = calloc(PATH_MAX, sizeof(char));
snprintf(cmd, PATH_MAX-1, "SCAN STREAM %s SIZE %d\n", filename, filesize);
Syslog('f', "snd: %s", printable(cmd, 0));
if (write(s, cmd, strlen(cmd)) == -1) {
WriteError("$write()");
return 2;
}
free(cmd);
/*
* Stream the data
*/
if ((fp = fopen(filename, "r")) == NULL) {
WriteError("$can't open %s", filename);
return 2;
}
while ((buf_len = fread(buf, 1, sizeof(buf), fp)) > 0) {
if (write(s, buf, buf_len) == -1) {
if (errno == EPIPE)
break;
WriteError("$write2()");
fclose(fp);
return 2;
}
}
fclose(fp);
if ((buf_len = read(s, buf, sizeof(buf)-1)) == -1) {
WriteError("$read()");
return 2;
}
buf[buf_len] = '\0';
Syslog('f', "got: %s", printable(buf, 0));
cmd = xstrcpy(buf);
str1 = strtok(cmd, "<");
str1[strlen(str1)-1] = '\0';
str2 = strtok(NULL, ">");
err = atoi(str1);
if (err) {
// Message looks like: 'contains infected objects: EICAR_Test_File'
WriteError("F-Prot stream check %s, rc=%d", str2, err);
return 1;
}
close(s);
Syslog('f', "fp_stream_check(): no virus found");
return 0;
}
/*
* Virusscan on a file.
*/
int VirScanFile(char *filename)
{
char *temp, *stdlog, *errlog, buf[256], *port;
FILE *fp, *lp;
int vrc, rc = FALSE, has_scan = FALSE;
temp = calloc(PATH_MAX, sizeof(char));
snprintf(temp, PATH_MAX, "%s/etc/virscan.data", getenv("MBSE_ROOT"));
if ((fp = fopen(temp, "r")) == NULL) {
WriteError("No virus scanners defined");
free(temp);
return FALSE;
}
fread(&virscanhdr, sizeof(virscanhdr), 1, fp);
while (fread(&virscan, virscanhdr.recsize, 1, fp) == 1) {
if (virscan.available && (virscan.scantype == SCAN_EXTERN)) {
if (file_exist(virscan.scanner, X_OK) == 0) {
has_scan = TRUE;
} else {
Syslog('+', "Warning: virusscanner %s marked active but not present", virscan.comment);
}
}
if (virscan.available && (virscan.scantype != SCAN_EXTERN)) {
has_scan = TRUE;
}
}
if (!has_scan) {
Syslog('+', "No active virus scanners, skipping scan");
fclose(fp);
free(temp);
return FALSE;
}
stdlog = calloc(PATH_MAX, sizeof(char));
errlog = calloc(PATH_MAX, sizeof(char));
snprintf(stdlog, PATH_MAX, "%s/tmp/stdlog%d", getenv("MBSE_ROOT"), mypid);
snprintf(errlog, PATH_MAX, "%s/tmp/errlog%d", getenv("MBSE_ROOT"), mypid);
fseek(fp, virscanhdr.hdrsize, SEEK_SET);
while (fread(&virscan, virscanhdr.recsize, 1, fp) == 1) {
if (virscan.available) {
Syslog('+', "Scanning %s with %s", filename, virscan.comment);
Altime(3600);
switch (virscan.scantype) {
case SCAN_EXTERN: if (file_exist(virscan.scanner, X_OK) ==0) {
vrc = execute_str(virscan.scanner, virscan.options, filename, (char *)"/dev/null", stdlog, errlog);
if (file_size(stdlog)) {
if ((lp = fopen(stdlog, "r"))) {
while (fgets(buf, sizeof(buf) -1, lp)) {
Striplf(buf);
Syslog('+', "stdout: \"%s\"", printable(buf, 0));
}
fclose(lp);
}
}
if (file_size(errlog)) {
if ((lp = fopen(errlog, "r"))) {
while (fgets(buf, sizeof(buf) -1, lp)) {
Striplf(buf);
Syslog('+', "stderr: \"%s\"", printable(buf, 0));
}
fclose(lp);
}
}
unlink(stdlog);
unlink(errlog);
if (vrc != virscan.error) {
WriteError("Virus found by %s", virscan.comment);
rc = TRUE;
}
}
break;
case CLAM_STREAM: port = calloc(21, sizeof(char));
snprintf(port, 20, "%d", virscan.port);
if ((clam_stream_check(virscan.host, port, filename) == 1)) {
rc = TRUE;
}
free(port);
break;
case FP_STREAM: port = calloc(21, sizeof(char));
snprintf(port, 20, "%d", virscan.port);
if ((fp_stream_check(virscan.host, port, filename) == 1)) {
rc = TRUE;
}
free(port);
break;
}
Altime(0);
Nopper();
}
}
fclose(fp);
free(temp);
free(stdlog);
free(errlog);
return rc;
}