libclamav/special.c
c3a3be2d
 /*
c442ca9c
  *  Copyright (C) 2013-2019 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
  *  Copyright (C) 2007-2013 Sourcefire, Inc.
2023340a
  *
42d26ac9
  *  Authors: Trog, Török Edvin
c3a3be2d
  *
  *  This program is free software; you can redistribute it and/or modify
2023340a
  *  it under the terms of the GNU General Public License version 2 as
  *  published by the Free Software Foundation.
c3a3be2d
  *
  *  This program is distributed in the hope that it will be useful,
  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
  *  GNU General Public License for more details.
  *
  *  You should have received a copy of the GNU General Public License
  *  along with this program; if not, write to the Free Software
48b7b4a7
  *  Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
  *  MA 02110-1301, USA.
c3a3be2d
  */
 
be4bf7f4
 #if HAVE_CONFIG_H
eb308794
 #include "clamav-config.h"
be4bf7f4
 #endif
eb308794
 
c3a3be2d
 #include <sys/types.h>
 #include <sys/stat.h>
 #include <fcntl.h>
b58fdfc2
 #ifdef	HAVE_UNISTD_H
c3a3be2d
 #include <unistd.h>
b58fdfc2
 #endif
eb308794
 #include <string.h>
42d26ac9
 #include <ctype.h>
b705e8d7
 #ifndef _WIN32
11195c0b
 #include <netinet/in.h>
b705e8d7
 #endif
b2e7c931
 
c3a3be2d
 #include "clamav.h"
 #include "others.h"
079229d6
 #include "special.h"
e4101980
 #include "matcher.h"
c3a3be2d
 
7461fea2
 /* NOTE: Photoshop stores data in BIG ENDIAN format, this is the opposite
 	to virtually everything else */
 
75282b5c
 #define special_endian_convert_16(v) be16_to_host(v)
 #define special_endian_convert_32(v) be32_to_host(v)
7461fea2
 
d0e17a28
 int cli_check_mydoom_log(cli_ctx *ctx)
c3a3be2d
 {
bad8bbc7
 	const uint32_t *record;
 	uint32_t check, key;
d0e17a28
 	fmap_t *map = *ctx->fmap;
 	unsigned int blocks = map->len / (8*4);
c3a3be2d
 
     cli_dbgmsg("in cli_check_mydoom_log()\n");
d0e17a28
     if(blocks<2)
 	return CL_CLEAN;
     if(blocks>5)
 	blocks = 5;
c3a3be2d
 
d0e17a28
     record = fmap_need_off_once(map, 0, 8*4*blocks);
     if(!record)
 	return CL_CLEAN;
     while(blocks) { /* This wasn't probably intended but that's what the current code does anyway */
 	if(record[--blocks] == 0xffffffff)
c3a3be2d
 	    return CL_CLEAN;
     }
 
d0e17a28
     key = ~be32_to_host(record[0]);
     check = (be32_to_host(record[1])^key) +
 	(be32_to_host(record[2])^key) +
 	(be32_to_host(record[3])^key) +
 	(be32_to_host(record[4])^key) +
 	(be32_to_host(record[5])^key) +
 	(be32_to_host(record[6])^key) +
 	(be32_to_host(record[7])^key);
     if ((~check) != key)
 	return CL_CLEAN;
 
     key = ~be32_to_host(record[8]);
     check = (be32_to_host(record[9])^key) +
 	(be32_to_host(record[10])^key) +
 	(be32_to_host(record[11])^key) +
 	(be32_to_host(record[12])^key) +
 	(be32_to_host(record[13])^key) +
 	(be32_to_host(record[14])^key) +
 	(be32_to_host(record[15])^key);
     if ((~check) != key)
 	return CL_CLEAN;
c3a3be2d
 
cbf5017a
     return cli_append_virus(ctx, "Heuristics.Worm.Mydoom.M.log");
c3a3be2d
 }
 
32d37729
 static int jpeg_check_photoshop_8bim(cli_ctx *ctx, off_t *off)
7461fea2
 {
32d37729
 	const unsigned char *buf;
e3ee2016
 	uint16_t ntmp;
 	uint8_t nlength, id[2];
7461fea2
 	uint32_t size;
32d37729
 	off_t offset = *off;
7461fea2
 	int retval;
32d37729
 	fmap_t *map = *ctx->fmap;
7461fea2
 
32d37729
 	if(!(buf = fmap_need_off_once(map, offset, 4 + 2 + 1))) {
7461fea2
 		cli_dbgmsg("read bim failed\n");
 		return -1;
 	}
32d37729
 	if (memcmp(buf, "8BIM", 4) != 0) {
 		cli_dbgmsg("missed 8bim\n");
7461fea2
 		return -1;
 	}
 
e3ee2016
 	id[0] = (uint8_t)buf[4];
         id[1] = (uint8_t)buf[5];
 	cli_dbgmsg("ID: 0x%.2x%.2x\n", id[0], id[1]);
32d37729
 	nlength = buf[6];
e53eccdd
 	ntmp = nlength + ((((uint16_t)nlength)+1) & 0x01);
32d37729
 	offset += 4 + 2 + 1 + ntmp;
 
 	if (fmap_readn(map, &size, offset, 4) != 4) {
7461fea2
 		return -1;
 	}
 	size = special_endian_convert_32(size);
 	if (size == 0) {
 		return -1;
 	}
 	if ((size & 0x01) == 1) {
 		size++;
 	}
32d37729
 
 	*off = offset + 4 + size;
e3ee2016
 	/* Is it a thumbnail image: 0x0409 or 0x040c */
 	if ((id[0] == 0x04) && ((id[1] == 0x09) || (id[1] == 0x0c))) {
 		/* Yes */
 		cli_dbgmsg("found thumbnail\n");
 	}
 	else {
7461fea2
 		/* No - Seek past record */
 		return 0;
 	}
 
 	/* Jump past header */
32d37729
 	offset += 4 + 28;
7461fea2
 
32d37729
 	retval = cli_check_jpeg_exploit(ctx, offset);
7461fea2
 	if (retval == 1) {
a8d1578e
 		cli_dbgmsg("Exploit found in thumbnail\n");
7461fea2
 	}
 	return retval;
 }
 
32d37729
 static int jpeg_check_photoshop(cli_ctx *ctx, off_t offset)
7461fea2
 {
 	int retval;
32d37729
 	const unsigned char *buffer;
 	off_t old;
 	fmap_t *map = *ctx->fmap;
7461fea2
 
32d37729
 	if(!(buffer = fmap_need_off_once(map, offset, 14))) {
7461fea2
 		return 0;
 	}
 
 	if (memcmp(buffer, "Photoshop 3.0", 14) != 0) {
 		return 0;
 	}
32d37729
 	offset += 14;
7461fea2
 
 	cli_dbgmsg("Found Photoshop segment\n");
 	do {
32d37729
 		old = offset;
 		retval = jpeg_check_photoshop_8bim(ctx, &offset);
 		if(offset <= old)
52b5464e
 			break;
7461fea2
 	} while (retval == 0);
 
 	if (retval == -1) {
 		retval = 0;
 	}
 	return retval;
 }
 
32d37729
 int cli_check_jpeg_exploit(cli_ctx *ctx, off_t offset)
c3a3be2d
 {
32d37729
 	const unsigned char *buffer;
c3a3be2d
 	int retval;
32d37729
 	fmap_t *map = *ctx->fmap;
c3a3be2d
 
 	cli_dbgmsg("in cli_check_jpeg_exploit()\n");
be63d0ad
 	if(ctx->recursion > ctx->engine->maxreclevel)
 	    return CL_EMAXREC;
c3a3be2d
 
32d37729
 	if(!(buffer = fmap_need_off_once(map, offset, 2)))
c3a3be2d
 		return 0;
1949c758
 	if ((buffer[0] != 0xff) || (buffer[1] != 0xd8)) {
c3a3be2d
 		return 0;
 	}
32d37729
 	offset += 2;
c3a3be2d
 	for (;;) {
32d37729
 		off_t new_off;
 		if(!(buffer = fmap_need_off_once(map, offset, 4))) {
c3a3be2d
 			return 0;
 		}
3dd7010e
 		/* Check for multiple 0xFF values, we need to skip them */
 		if ((buffer[0] == 0xff) && (buffer[1] == 0xff)) {
32d37729
 			offset++;
3dd7010e
 			continue;
 		}
32d37729
 		offset += 4;
c3a3be2d
 		if ((buffer[0] == 0xff) && (buffer[1] == 0xfe)) {
 			if (buffer[2] == 0x00) {
 				if ((buffer[3] == 0x00) || (buffer[3] == 0x01)) {
 					return 1;
 				}
 			}
 		}
 		if (buffer[0] != 0xff) {
 			return -1;
 		}
 		if (buffer[1] == 0xda) {
 			/* End of Image marker */
 			return 0;
 		}
7461fea2
 
32d37729
 		new_off = ((unsigned int) buffer[2] << 8) + buffer[3];
 		if (new_off < 2) {
c7c9dbf0
 			return -1;
c3a3be2d
 		}
32d37729
 		new_off -= 2;
 		new_off += offset;
7461fea2
 
 		if (buffer[1] == 0xed) {
 			/* Possible Photoshop file */
be63d0ad
 			ctx->recursion++;
32d37729
 			retval=jpeg_check_photoshop(ctx, offset);
be63d0ad
 			ctx->recursion--;
 			if (retval != 0)
7461fea2
 				return retval;
 		}
32d37729
 		offset = new_off;
c3a3be2d
 	}
 }
00114f48
 
6ff9deca
 static uint32_t riff_endian_convert_32(uint32_t value, int big_endian)
 {
75282b5c
 	if (big_endian)
 		return be32_to_host(value);
 	else
 		return le32_to_host(value);
6ff9deca
 }
00114f48
 
bad8bbc7
 static int riff_read_chunk(fmap_t *map, off_t *offset, int big_endian, int rec_level)
00114f48
 {
e0dc633e
 	uint32_t cache_buf;
 	char *buffer;
bad8bbc7
 	const uint32_t *buf;
00114f48
 	uint32_t chunk_size;
bad8bbc7
 	off_t cur_offset = *offset;
00114f48
 
 	if (rec_level > 1000) {
 		cli_dbgmsg("riff_read_chunk: recursion level exceeded\n");
 		return 0;
 	}
 
bad8bbc7
 	if(!(buf = fmap_need_off_once(map, cur_offset, 4*2)))
 	    return 0;
 	cur_offset += 4*2;
d6a7a3e5
 
0deac573
 	buffer = (char *)buf;
e0dc633e
 	memcpy (&cache_buf, buffer + sizeof (cache_buf),
 			sizeof (cache_buf));
 	chunk_size = riff_endian_convert_32(cache_buf, big_endian);
bad8bbc7
 
 	if(!memcmp(buf, "anih", 4) && chunk_size != 36)
f08871d0
 	    return 2;
 
bad8bbc7
 	if (memcmp(buf, "RIFF", 4) == 0) {
00114f48
 		return 0;
bad8bbc7
 	} else if (memcmp(buf, "RIFX", 4) == 0) {
00114f48
 		return 0;
 	}
 	
bad8bbc7
 	if ((memcmp(buf, "LIST", 4) == 0) ||
 		 (memcmp(buf, "PROP", 4) == 0) ||
 		 (memcmp(buf, "FORM", 4) == 0) ||
 		 (memcmp(buf, "CAT ", 4) == 0)) {
 		if (!fmap_need_ptr_once(map, buf+2, 4)) {
00114f48
 			cli_dbgmsg("riff_read_chunk: read list type failed\n");
 			return 0;
 		}
bad8bbc7
 		*offset = cur_offset+4;
 		return riff_read_chunk(map, offset, big_endian, ++rec_level);
00114f48
 	}
 	
bad8bbc7
 	*offset = cur_offset + chunk_size + (chunk_size&1);
 	if (*offset < cur_offset) {
00114f48
 		return 0;
 	}
bad8bbc7
 	/* FIXME: WTF!?
00114f48
 	if (lseek(fd, offset, SEEK_SET) != offset) {
 		return 2;
 	}
bad8bbc7
 	*/
00114f48
 	return 1;
 }
 
bad8bbc7
 int cli_check_riff_exploit(cli_ctx *ctx)
00114f48
 {
bad8bbc7
 	const uint32_t *buf;
 	int big_endian, retval;
00114f48
 	off_t offset;
bad8bbc7
 	fmap_t *map = *ctx->fmap;
00114f48
 	
 	cli_dbgmsg("in cli_check_riff_exploit()\n");
 
bad8bbc7
 	if(!(buf = fmap_need_off_once(map, 0, 4*3)))
 	    return 0;
 
 	if (memcmp(buf, "RIFF", 4) == 0) {
00114f48
 		big_endian = FALSE;
bad8bbc7
 	} else if (memcmp(buf, "RIFX", 4) == 0) {
00114f48
 		big_endian = TRUE;
 	} else {
 		/* Not a RIFF file */
 		return 0;
 	}
 
bad8bbc7
 	if (memcmp(&buf[2], "ACON", 4) != 0) {
7fd4d69b
 		/* Only scan MS animated icon files */
 		/* There is a *lot* of broken software out there that produces bad RIFF files */
 		return 0;
 	}
 
bad8bbc7
 	offset = 4*3;
00114f48
 	do {
bad8bbc7
 		retval = riff_read_chunk(map, &offset, big_endian, 1);
00114f48
 	} while (retval == 1);
 
 	return retval;
 }
42d26ac9
 
 static inline int swizz_j48(const uint16_t n[])
 {
 	cli_dbgmsg("swizz_j48: %u, %u, %u\n",n[0],n[1],n[2]);
 	/* rules based on J48 tree */
e943d060
 	if (n[0] <= 961 || !n[1])
f27fab00
 		return 0;
 	if (n[0] <= 1006)
 		return (n[2] > 0 && n[2] <= 6);
 	else
e943d060
 		return n[1] <= 10 && n[2];
42d26ac9
 }
 
 void cli_detect_swizz_str(const unsigned char *str, uint32_t len, struct swizz_stats *stats, int blob)
 {
 	unsigned char stri[4096];
d18d7221
 	size_t i, j = 0;
42d26ac9
 	int bad = 0;
 	int lastalnum = 0;
 	uint8_t ngrams[17576];
 	uint16_t all=0;
 	uint16_t ngram_cnts[3];
 	uint16_t words = 0;
 	int ret;
 
e6d1a8b7
 	stats->entries++;
d18d7221
 	for (i=0; (i < (size_t)len - 1) && (j < sizeof(stri) - 2); i += 2)
 	{
42d26ac9
 		unsigned char c = str[i];
 		if (str[i+1] || !c) {
 			bad++;
 			continue;
 		}
 		if (!isalnum(c)) {
 			if (!lastalnum)
 				continue;
 			lastalnum = 0;
 			c = ' ';
 		} else {
 			lastalnum = 1;
 			if (isdigit(c))
 				continue;
 		}
 		stri[j++] = tolower(c);
 	}
 	stri[j++] = '\0';
 	if ((!blob && (bad >= 8)) || j < 4)
 		return;
 	memset(ngrams, 0, sizeof(ngrams));
 	memset(ngram_cnts, 0, sizeof(ngram_cnts));
 	for(i=0;i<j-2;i++) {
 		if (stri[i] != ' ' && stri[i+1] != ' ' && stri[i+2] != ' ') {
 			uint16_t idx = (stri[i] - 'a')*676 + (stri[i+1] - 'a')*26 + (stri[i+2] - 'a');
f27fab00
 			if (idx < sizeof(ngrams)) {
42d26ac9
 				ngrams[idx]++;
f27fab00
 				stats->gngrams[idx]++;
 			}
42d26ac9
 		} else if (stri[i] == ' ')
 			words++;
 	}
 	for(i=0;i<sizeof(ngrams);i++) {
 		uint8_t v = ngrams[i];
 		if (v > 3) v = 3;
 		if (v) {
 			ngram_cnts[v-1]++;
 			all++;
 		}
 	}
 	if (!all)
 		return;
 	cli_dbgmsg("cli_detect_swizz_str: %u, %u, %u\n",ngram_cnts[0],ngram_cnts[1],ngram_cnts[2]);
 	/* normalize */
 	for(i=0;i<sizeof(ngram_cnts)/sizeof(ngram_cnts[0]);i++) {
 		uint32_t v = ngram_cnts[i];
 		ngram_cnts[i] = (v<<10)/all;
 	}
f27fab00
 	ret = swizz_j48(ngram_cnts) ? CL_VIRUS : CL_CLEAN;
e943d060
 	if (words < 3) ret = CL_CLEAN;
42d26ac9
 	cli_dbgmsg("cli_detect_swizz_str: %s, %u words\n", ret == CL_VIRUS ? "suspicious" : "ok", words);
188914fe
 	if (ret == CL_VIRUS) {
42d26ac9
 		stats->suspicious += j;
188914fe
 		cli_dbgmsg("cli_detect_swizz_str: %s\n", stri);
 	}
42d26ac9
 	stats->total += j;
 }
 
6f22c5e6
 static inline int swizz_j48_global(const uint32_t gn[])
f27fab00
 {
 	if (gn[0] <= 24185) {
 		return gn[0] > 22980 && gn[8] > 0 && gn[8] <= 97;
 	}
 	if (!gn[8]) {
 		if (gn[4] <= 311) {
 			if (!gn[4]) {
 				return gn[1] > 0 &&
 					((gn[0] <= 26579 && gn[3] > 0) ||
 					 (gn[0] > 28672 && gn[0] <= 30506));
 			}
 			if (gn[5] <= 616) {
 				if (gn[6] <= 104) {
 					return gn[9] <= 167;
 				}
 				return gn[6] <= 286;
 			}
 		}
 		return 0;
 	}
 	return 1;
 }
 
42d26ac9
 int cli_detect_swizz(struct swizz_stats *stats)
 {
f27fab00
 	uint32_t gn[10];
 	uint32_t all = 0;
d18d7221
 	size_t i;
f27fab00
 	int global_swizz = CL_CLEAN;
 
42d26ac9
 	cli_dbgmsg("cli_detect_swizz: %lu/%lu, version:%d, manifest: %d \n",
 			(unsigned long)stats->suspicious, (unsigned long)stats->total,
 			stats->has_version, stats->has_manifest);
f27fab00
 	memset(gn, 0, sizeof(gn));
 	for(i=0;i<17576;i++) {
 		uint8_t v = stats->gngrams[i];
 		if (v > 10) v = 10;
 		if (v) {
 			gn[v-1]++;
 			all++;
 		}
 	}
 	if (all) {
 		/* normalize */
 		cli_dbgmsg("cli_detect_swizz: gn: ");
 		for(i=0;i<sizeof(gn)/sizeof(gn[0]);i++) {
 			uint32_t v = gn[i];
 			gn[i] = (v<<15)/all;
 			if (cli_debug_flag)
000d1cb8
 			    fprintf(stderr, "%lu, ", (unsigned long)gn[i]);
f27fab00
 		}
 		global_swizz = swizz_j48_global(gn) ? CL_VIRUS : CL_CLEAN;
000d1cb8
 		if (cli_debug_flag) {
 		    fprintf(stderr, "\n");
 		    cli_dbgmsg("cli_detect_swizz: global: %s\n", global_swizz ? "suspicious" : "clean");
 		}
42d26ac9
 	}
f27fab00
 
e6d1a8b7
 	if (stats->errors > stats->entries || stats->errors >= SWIZZ_MAXERRORS) {
 	    cli_dbgmsg("cli_detect_swizz: resources broken, ignoring\n");
 	    return CL_CLEAN;
 	}
f27fab00
 	if (stats->total <= 337)
e6d1a8b7
 	    return CL_CLEAN;
f6108b20
 	if (stats->suspicious<<10 > 40*stats->total)
e6d1a8b7
 	    return CL_VIRUS;
 	if (!stats->suspicious)
 	    return CL_CLEAN;
f27fab00
 	return global_swizz;
42d26ac9
 }