libclamav/pe.c
6307ca15
 /*
be62f8ce
  *  Copyright (C) 2004 - 2006 Tomasz Kojm <tkojm@clamav.net>
6b169692
  *			      aCaB <acab@clamav.net>
5eb34fac
  *
6307ca15
  *  This program is free software; you can redistribute it and/or modify
  *  it under the terms of the GNU General Public License as published by
  *  the Free Software Foundation; either version 2 of the License, or
  *  (at your option) any later version.
  *
  *  This program is distributed in the hope that it will be useful,
  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
  *  GNU General Public License for more details.
  *
  *  You should have received a copy of the GNU General Public License
  *  along with this program; if not, write to the Free Software
48b7b4a7
  *  Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
  *  MA 02110-1301, USA.
6307ca15
  */
 
 #if HAVE_CONFIG_H
 #include "clamav-config.h"
 #endif
 
 #include <stdio.h>
 #include <string.h>
 #include <sys/types.h>
 #include <sys/stat.h>
 #include <fcntl.h>
 #include <sys/stat.h>
3fcb62ca
 #ifdef HAVE_UNISTD_H
6307ca15
 #include <unistd.h>
3fcb62ca
 #endif
6307ca15
 #include <time.h>
 
 #include "cltypes.h"
 #include "clamav.h"
 #include "others.h"
85dd8460
 #include "pe.h"
 #include "petite.h"
5f1a932b
 #include "fsg.h"
c2dfe70e
 #include "spin.h"
822930fc
 #include "upx.h"
 #include "yc.h"
60cd49c9
 #include "wwunpack.h"
3fcb62ca
 #include "suecrypt.h"
81030038
 #include "unsp.h"
85dd8460
 #include "scanners.h"
41fd7c2f
 #include "str.h"
01302683
 #include "execs.h"
c09d6c19
 #include "md5.h"
4aa4a05c
 #include "mew.h"
e8042398
 #include "upack.h"
6307ca15
 
c1fdde8a
 #ifndef	O_BINARY
 #define	O_BINARY	0
 #endif
 
bc93eda0
 #define DCONF ctx->dconf->pe
 
6307ca15
 #define IMAGE_DOS_SIGNATURE	    0x5a4d	    /* MZ */
ce389c9c
 #define IMAGE_DOS_SIGNATURE_OLD	    0x4d5a          /* ZM */
6307ca15
 #define IMAGE_NT_SIGNATURE	    0x00004550
667a4b35
 #define PE32_SIGNATURE		    0x010b
 #define PE32P_SIGNATURE		    0x020b
6307ca15
 
a9b1e8d2
 #define optional_hdr64 pe_opt.opt64
 #define optional_hdr32 pe_opt.opt32
 
ce389c9c
 #define UPX_NRV2B "\x11\xdb\x11\xc9\x01\xdb\x75\x07\x8b\x1e\x83\xee\xfc\x11\xdb\x11\xc9\x11\xc9\x75\x20\x41\x01\xdb"
 #define UPX_NRV2D "\x83\xf0\xff\x74\x78\xd1\xf8\x89\xc5\xeb\x0b\x01\xdb\x75\x07\x8b\x1e\x83\xee\xfc\x11\xdb\x11\xc9"
 #define UPX_NRV2E "\xeb\x52\x31\xc9\x83\xe8\x03\x72\x11\xc1\xe0\x08\x8a\x06\x46\x83\xf0\xff\x74\x75\xd1\xf8\x89\xc5"
342e27a5
 
75282b5c
 #define EC32(x) le32_to_host(x) /* Convert little endian to host */
 #define EC16(x) le16_to_host(x)
81030038
 /* lower and upper bondary alignment (size vs offset) */
 #define PEALIGN(o,a) (((a))?(((o)/(a))*(a)):(o))
 #define PESALIGN(o,a) (((a))?(((o)/(a)+((o)%(a)!=0))*(a)):(o))
a9082ea2
 
 extern short cli_leavetemps_flag;
 
be62f8ce
 struct offset_list {
     uint32_t offset;
     struct offset_list *next;
 };
 
57866af1
 static uint32_t cli_rawaddr(uint32_t rva, struct cli_exe_section *shp, uint16_t nos, unsigned int *err,	size_t fsize)
ac75a532
 {
 	int i, found = 0;
57866af1
 	uint32_t ret;
ac75a532
 
57866af1
     if (rva<0x1000) { /* Out of section EP - mapped to imagebase+rva */
         if (rva >= fsize) {
 	    *err=1;
 	    return 0;
 	}
         *err=0;
 	return rva;
     }
ac75a532
 
57866af1
     for(i = nos-1; i >= 0; i--) {
         if(shp[i].rsz && shp[i].rva <= rva && shp[i].rsz > rva - shp[i].rva) {
ac75a532
 	    found = 1;
 	    break;
 	}
     }
 
     if(!found) {
33f89aa5
 	*err = 1;
 	return 0;
ac75a532
     }
 
57866af1
     ret = rva - shp[i].rva + shp[i].raw;
33f89aa5
     *err = 0;
57866af1
     return ret;
ac75a532
 }
 
343316ab
 static void xckriz(char **opcode, int *len, int checksize, int reg) {
57866af1
     while(*len>6) {
         if (**opcode>='\x48' && **opcode<='\x4f' && **opcode!='\x4c') {
 	    if ((char)(**opcode-reg)=='\x48') break;
 	    (*len)--;
 	    (*opcode)++;
 	    continue;
 	}
 	if (**opcode>='\xb8' && **opcode<='\xbf' && **opcode!='\xbc') {
 	    if (checksize && cli_readint32(*opcode+1)==0x0fd2) break;
 	    (*len)-=5;
 	    (*opcode)+=5;
 	    continue;
 	}
 	if (**opcode=='\x81') {
 	    (*len)-=6;
 	    (*opcode)+=6;
 	    continue;
343316ab
 	}
57866af1
 	break;
     }
343316ab
 }
 
 
33f89aa5
 /*
ac75a532
 static int cli_ddump(int desc, int offset, int size, const char *file)
6c9455c2
 {
 	int pos, ndesc, bread, sum = 0;
 	char buff[FILEBUFF];
 
 
     cli_dbgmsg("in ddump()\n");
 
     if((pos = lseek(desc, 0, SEEK_CUR)) == -1) {
 	cli_dbgmsg("Invalid descriptor\n");
a9082ea2
 	return -1;
6c9455c2
     }
 
     if(lseek(desc, offset, SEEK_SET) == -1) {
 	cli_dbgmsg("lseek() failed\n");
 	lseek(desc, pos, SEEK_SET);
a9082ea2
 	return -1;
6c9455c2
     }
 
c1fdde8a
     if((ndesc = open(file, O_WRONLY|O_CREAT|O_TRUNC|O_BINARY, S_IRWXU)) < 0) {
6c9455c2
 	cli_dbgmsg("Can't create file %s\n", file);
 	lseek(desc, pos, SEEK_SET);
a9082ea2
 	return -1;
6c9455c2
     }
 
77fcd089
     while((bread = cli_readn(desc, buff, FILEBUFF)) > 0) {
6c9455c2
 	if(sum + bread >= size) {
 	    if(write(ndesc, buff, size - sum) == -1) {
 		cli_dbgmsg("Can't write to file\n");
 		lseek(desc, pos, SEEK_SET);
 		close(ndesc);
 		unlink(file);
a9082ea2
 		return -1;
6c9455c2
 	    }
 	    break;
 	} else {
 	    if(write(ndesc, buff, bread) == -1) {
 		cli_dbgmsg("Can't write to file\n");
 		lseek(desc, pos, SEEK_SET);
 		close(ndesc);
 		unlink(file);
a9082ea2
 		return -1;
6c9455c2
 	    }
 	}
 	sum += bread;
     }
 
     close(ndesc);
     lseek(desc, pos, SEEK_SET);
     return 0;
 }
33f89aa5
 */
6c9455c2
 
57866af1
 static unsigned int cli_md5sect(int fd, uint32_t offset, uint32_t size, unsigned char *digest)
c09d6c19
 {
 	size_t bread, sum = 0;
 	off_t pos;
 	char buff[FILEBUFF];
2a9e6ac8
 	cli_md5_ctx md5ctx;
c09d6c19
 
 
     if((pos = lseek(fd, 0, SEEK_CUR)) == -1) {
 	cli_dbgmsg("cli_md5sect: Invalid descriptor %d\n", fd);
57866af1
 	return 0;
c09d6c19
     }
 
     if(lseek(fd, offset, SEEK_SET) == -1) {
 	cli_dbgmsg("cli_md5sect: lseek() failed\n");
 	lseek(fd, pos, SEEK_SET);
57866af1
 	return 0;
c09d6c19
     }
 
2a9e6ac8
     cli_md5_init(&md5ctx);
c09d6c19
 
     while((bread = cli_readn(fd, buff, FILEBUFF)) > 0) {
 	if(sum + bread >= size) {
2a9e6ac8
 	    cli_md5_update(&md5ctx, buff, size - sum);
c09d6c19
 	    break;
 	} else {
2a9e6ac8
 	    cli_md5_update(&md5ctx, buff, bread);
c09d6c19
 	    sum += bread;
 	}
     }
 
2a9e6ac8
     cli_md5_final(digest, &md5ctx);
c09d6c19
     lseek(fd, pos, SEEK_SET);
57866af1
     return 1;
c09d6c19
 }
 
3c91998b
 int cli_scanpe(int desc, cli_ctx *ctx)
6307ca15
 {
 	uint16_t e_magic; /* DOS signature ("MZ") */
a9082ea2
 	uint16_t nsections;
6307ca15
 	uint32_t e_lfanew; /* address of new exe header */
57866af1
 	uint32_t ep, vep; /* entry point (raw, virtual) */
be62f8ce
 	uint8_t polipos = 0;
8000d078
 	time_t timestamp;
6307ca15
 	struct pe_image_file_hdr file_hdr;
57866af1
 	union {
 	    struct pe_image_optional_hdr64 opt64;
 	    struct pe_image_optional_hdr32 opt32;
 	} pe_opt;
ac75a532
 	struct pe_image_section_hdr *section_hdr;
c09d6c19
 	struct cli_md5_node *md5_sect;
6307ca15
 	struct stat sb;
e48f0bff
 	char sname[9], buff[4096], *tempfile;
57866af1
 	unsigned char *ubuff;
be62f8ce
 	ssize_t bytes;
57866af1
 	unsigned int i, found, upx_success = 0, min = 0, max = 0, err;
667a4b35
 	unsigned int ssize = 0, dsize = 0, dll = 0, pe_plus = 0;
dddbbad7
 	int (*upxfn)(char *, uint32_t, char *, uint32_t *, uint32_t, uint32_t, uint32_t) = NULL;
d0bc76cb
 	char *src = NULL, *dest = NULL;
e8042398
 	int ndesc, ret = CL_CLEAN, upack = 0;
e0264472
 	size_t fsize;
57866af1
 	uint32_t valign, falign;
 	struct cli_exe_section *exe_sections;
6307ca15
 
 
77fcd089
     if(cli_readn(desc, &e_magic, sizeof(e_magic)) != sizeof(e_magic)) {
6c9455c2
 	cli_dbgmsg("Can't read DOS signature\n");
88bbec78
 	return CL_CLEAN;
6307ca15
     }
 
ce389c9c
     if(EC16(e_magic) != IMAGE_DOS_SIGNATURE && EC16(e_magic) != IMAGE_DOS_SIGNATURE_OLD) {
6307ca15
 	cli_dbgmsg("Invalid DOS signature\n");
a9082ea2
 	return CL_CLEAN;
6307ca15
     }
 
     lseek(desc, 58, SEEK_CUR); /* skip to the end of the DOS header */
 
77fcd089
     if(cli_readn(desc, &e_lfanew, sizeof(e_lfanew)) != sizeof(e_lfanew)) {
6c9455c2
 	cli_dbgmsg("Can't read new header address\n");
88bbec78
 	/* truncated header? */
 	if(DETECT_BROKEN) {
3c91998b
 	    if(ctx->virname)
 		*ctx->virname = "Broken.Executable";
88bbec78
 	    return CL_VIRUS;
 	}
 	return CL_CLEAN;
6307ca15
     }
 
a9082ea2
     e_lfanew = EC32(e_lfanew);
6307ca15
     cli_dbgmsg("e_lfanew == %d\n", e_lfanew);
     if(!e_lfanew) {
 	cli_dbgmsg("Not a PE file\n");
a9082ea2
 	return CL_CLEAN;
6307ca15
     }
7a0143cf
 
     if(lseek(desc, e_lfanew, SEEK_SET) < 0) {
 	/* probably not a PE file */
 	cli_dbgmsg("Can't lseek to e_lfanew\n");
 	return CL_CLEAN;
     }
6307ca15
 
77fcd089
     if(cli_readn(desc, &file_hdr, sizeof(struct pe_image_file_hdr)) != sizeof(struct pe_image_file_hdr)) {
7a0143cf
 	/* bad information in e_lfanew - probably not a PE file */
6307ca15
 	cli_dbgmsg("Can't read file header\n");
7a0143cf
 	return CL_CLEAN;
6307ca15
     }
 
a9082ea2
     if(EC32(file_hdr.Magic) != IMAGE_NT_SIGNATURE) {
6c9455c2
 	cli_dbgmsg("Invalid PE signature (probably NE file)\n");
a9082ea2
 	return CL_CLEAN;
6307ca15
     }
 
9ad59d16
     if(EC16(file_hdr.Characteristics) & 0x2000) {
 	cli_dbgmsg("File type: DLL\n");
 	dll = 1;
     } else if(EC16(file_hdr.Characteristics) & 0x01) {
 	cli_dbgmsg("File type: Executable\n");
     }
 
a9082ea2
     switch(EC16(file_hdr.Machine)) {
821b0adb
 	case 0x0:
 	    cli_dbgmsg("Machine type: Unknown\n");
6307ca15
 	case 0x14c:
6c9455c2
 	    cli_dbgmsg("Machine type: 80386\n");
6307ca15
 	    break;
821b0adb
 	case 0x14d:
6c9455c2
 	    cli_dbgmsg("Machine type: 80486\n");
6307ca15
 	    break;
821b0adb
 	case 0x14e:
6c9455c2
 	    cli_dbgmsg("Machine type: 80586\n");
6307ca15
 	    break;
821b0adb
 	case 0x160:
 	    cli_dbgmsg("Machine type: R30000 (big-endian)\n");
 	    break;
6307ca15
 	case 0x162:
6c9455c2
 	    cli_dbgmsg("Machine type: R3000\n");
6307ca15
 	    break;
 	case 0x166:
6c9455c2
 	    cli_dbgmsg("Machine type: R4000\n");
6307ca15
 	    break;
 	case 0x168:
6c9455c2
 	    cli_dbgmsg("Machine type: R10000\n");
6307ca15
 	    break;
 	case 0x184:
6c9455c2
 	    cli_dbgmsg("Machine type: DEC Alpha AXP\n");
6307ca15
 	    break;
399815d9
 	case 0x284:
 	    cli_dbgmsg("Machine type: DEC Alpha AXP 64bit\n");
 	    break;
6307ca15
 	case 0x1f0:
6c9455c2
 	    cli_dbgmsg("Machine type: PowerPC\n");
6307ca15
 	    break;
399815d9
 	case 0x200:
 	    cli_dbgmsg("Machine type: IA64\n");
 	    break;
 	case 0x268:
 	    cli_dbgmsg("Machine type: M68k\n");
 	    break;
 	case 0x266:
 	    cli_dbgmsg("Machine type: MIPS16\n");
 	    break;
 	case 0x366:
 	    cli_dbgmsg("Machine type: MIPS+FPU\n");
 	    break;
 	case 0x466:
 	    cli_dbgmsg("Machine type: MIPS16+FPU\n");
 	    break;
 	case 0x1a2:
 	    cli_dbgmsg("Machine type: Hitachi SH3\n");
 	    break;
821b0adb
 	case 0x1a3:
 	    cli_dbgmsg("Machine type: Hitachi SH3-DSP\n");
 	    break;
 	case 0x1a4:
 	    cli_dbgmsg("Machine type: Hitachi SH3-E\n");
 	    break;
399815d9
 	case 0x1a6:
 	    cli_dbgmsg("Machine type: Hitachi SH4\n");
 	    break;
821b0adb
 	case 0x1a8:
 	    cli_dbgmsg("Machine type: Hitachi SH5\n");
 	    break;
399815d9
 	case 0x1c0:
 	    cli_dbgmsg("Machine type: ARM\n");
 	    break;
 	case 0x1c2:
 	    cli_dbgmsg("Machine type: THUMB\n");
 	    break;
821b0adb
 	case 0x1d3:
 	    cli_dbgmsg("Machine type: AM33\n");
 	    break;
 	case 0x520:
 	    cli_dbgmsg("Machine type: Infineon TriCore\n");
 	    break;
 	case 0xcef:
 	    cli_dbgmsg("Machine type: CEF\n");
 	    break;
 	case 0xebc:
 	    cli_dbgmsg("Machine type: EFI Byte Code\n");
 	    break;
 	case 0x9041:
 	    cli_dbgmsg("Machine type: M32R\n");
 	    break;
 	case 0xc0ee:
 	    cli_dbgmsg("Machine type: CEE\n");
 	    break;
 	case 0x8664:
 	    cli_dbgmsg("Machine type: AMD64\n");
 	    break;
6307ca15
 	default:
399815d9
 	    cli_warnmsg("Unknown machine type in PE header (0x%x)\n", EC16(file_hdr.Machine));
6307ca15
     }
 
a9082ea2
     nsections = EC16(file_hdr.NumberOfSections);
57866af1
     if(nsections < 1 || nsections > 96) {
f86b5ac1
 	if(DETECT_BROKEN) {
3c91998b
 	    if(ctx->virname)
 		*ctx->virname = "Broken.Executable";
f86b5ac1
 	    return CL_VIRUS;
 	}
e2ff1490
 	if(nsections)
 	    cli_warnmsg("PE file contains %d sections\n", nsections);
 	else
 	    cli_warnmsg("PE file contains no sections\n");
f86b5ac1
 	return CL_CLEAN;
     }
a9082ea2
     cli_dbgmsg("NumberOfSections: %d\n", nsections);
 
8000d078
     timestamp = (time_t) EC32(file_hdr.TimeDateStamp);
     cli_dbgmsg("TimeDateStamp: %s", ctime(&timestamp));
6307ca15
 
d399f19b
     cli_dbgmsg("SizeOfOptionalHeader: %x\n", EC16(file_hdr.SizeOfOptionalHeader));
6307ca15
 
57866af1
     if (EC16(file_hdr.SizeOfOptionalHeader) < sizeof(struct pe_image_optional_hdr32)) {
         cli_dbgmsg("SizeOfOptionalHeader too small\n");
 	if(DETECT_BROKEN) {
 	    if(ctx->virname)
 	        *ctx->virname = "Broken.Executable";
 	    return CL_VIRUS;
20c3d44d
 	}
57866af1
 	return CL_CLEAN;
6307ca15
     }
 
57866af1
     if(cli_readn(desc, &optional_hdr32, sizeof(struct pe_image_optional_hdr32)) != sizeof(struct pe_image_optional_hdr32)) {
         cli_dbgmsg("Can't read optional file header\n");
 	if(DETECT_BROKEN) {
 	    if(ctx->virname)
 	        *ctx->virname = "Broken.Executable";
 	    return CL_VIRUS;
 	}
 	return CL_CLEAN;
     }
667a4b35
 
57866af1
     /* This will be a chicken and egg problem until we drop 9x */
     if(EC32(optional_hdr64.Magic)==PE32P_SIGNATURE) {
         if(EC16(file_hdr.SizeOfOptionalHeader)!=sizeof(struct pe_image_optional_hdr64)) {
 	    /* FIXME: need to play around a bit more with xp64 */
 	    cli_dbgmsg("Incorrect SizeOfOptionalHeader for PE32+\n");
667a4b35
 	    if(DETECT_BROKEN) {
57866af1
 	        if(ctx->virname)
3c91998b
 		    *ctx->virname = "Broken.Executable";
667a4b35
 		return CL_VIRUS;
 	    }
 	    return CL_CLEAN;
20c3d44d
 	}
57866af1
 	pe_plus = 1;
     } else {
         /*
 	    either it's got a PE32_SIGNATURE or
 	    we enable win9x compatibility in that we don't honor magic (see bb#119)
 	    either way it's a 32bit thingy
 	*/
         if(EC16(optional_hdr32.Magic) != PE32_SIGNATURE) {
667a4b35
 	    cli_warnmsg("Incorrect magic number in optional header\n");
 	    if(DETECT_BROKEN) {
57866af1
 	        if(ctx->virname)
3c91998b
 		    *ctx->virname = "Broken.Executable";
667a4b35
 		return CL_VIRUS;
 	    }
037f89cb
 	    cli_dbgmsg("9x compatibility mode\n");
667a4b35
 	}
57866af1
     }
 
     if(!pe_plus) { /* PE */
 	if (EC16(file_hdr.SizeOfOptionalHeader)!=sizeof(struct pe_image_optional_hdr32)) {
 	    /* Seek to the end of the long header */
 	    lseek(desc, (EC16(file_hdr.SizeOfOptionalHeader)-sizeof(struct pe_image_optional_hdr32)), SEEK_CUR);
 	}
 
b6aee321
 	if(DCONF & PE_CONF_UPACK)
 	    upack = (EC16(file_hdr.SizeOfOptionalHeader)==0x148);
 
57866af1
 	vep = EC32(optional_hdr32.AddressOfEntryPoint);
667a4b35
 	cli_dbgmsg("File format: PE\n");
 
 	cli_dbgmsg("MajorLinkerVersion: %d\n", optional_hdr32.MajorLinkerVersion);
 	cli_dbgmsg("MinorLinkerVersion: %d\n", optional_hdr32.MinorLinkerVersion);
57866af1
 	cli_dbgmsg("SizeOfCode: 0x%x\n", EC32(optional_hdr32.SizeOfCode));
 	cli_dbgmsg("SizeOfInitializedData: 0x%x\n", EC32(optional_hdr32.SizeOfInitializedData));
 	cli_dbgmsg("SizeOfUninitializedData: 0x%x\n", EC32(optional_hdr32.SizeOfUninitializedData));
 	cli_dbgmsg("AddressOfEntryPoint: 0x%x\n", vep);
667a4b35
 	cli_dbgmsg("BaseOfCode: 0x%x\n", EC32(optional_hdr32.BaseOfCode));
57866af1
 	cli_dbgmsg("SectionAlignment: 0x%x\n", EC32(optional_hdr32.SectionAlignment));
 	cli_dbgmsg("FileAlignment: 0x%x\n", EC32(optional_hdr32.FileAlignment));
667a4b35
 	cli_dbgmsg("MajorSubsystemVersion: %d\n", EC16(optional_hdr32.MajorSubsystemVersion));
 	cli_dbgmsg("MinorSubsystemVersion: %d\n", EC16(optional_hdr32.MinorSubsystemVersion));
57866af1
 	cli_dbgmsg("SizeOfImage: 0x%x\n", EC32(optional_hdr32.SizeOfImage));
 	cli_dbgmsg("SizeOfHeaders: 0x%x\n", EC32(optional_hdr32.SizeOfHeaders));
667a4b35
 	cli_dbgmsg("NumberOfRvaAndSizes: %d\n", EC32(optional_hdr32.NumberOfRvaAndSizes));
 
     } else { /* PE+ */
57866af1
         /* read the remaining part of the header */
         if(cli_readn(desc, &optional_hdr32 + 1, sizeof(struct pe_image_optional_hdr64) - sizeof(struct pe_image_optional_hdr32)) != sizeof(struct pe_image_optional_hdr64) - sizeof(struct pe_image_optional_hdr32)) {
 	    cli_dbgmsg("Can't read optional file header\n");
667a4b35
 	    if(DETECT_BROKEN) {
57866af1
 	        if(ctx->virname)
3c91998b
 		    *ctx->virname = "Broken.Executable";
667a4b35
 		return CL_VIRUS;
 	    }
 	    return CL_CLEAN;
 	}
 
57866af1
 	vep = EC32(optional_hdr64.AddressOfEntryPoint);
667a4b35
 	cli_dbgmsg("File format: PE32+\n");
 
 	cli_dbgmsg("MajorLinkerVersion: %d\n", optional_hdr64.MajorLinkerVersion);
 	cli_dbgmsg("MinorLinkerVersion: %d\n", optional_hdr64.MinorLinkerVersion);
57866af1
 	cli_dbgmsg("SizeOfCode: 0x%x\n", EC32(optional_hdr64.SizeOfCode));
 	cli_dbgmsg("SizeOfInitializedData: 0x%x\n", EC32(optional_hdr64.SizeOfInitializedData));
 	cli_dbgmsg("SizeOfUninitializedData: 0x%x\n", EC32(optional_hdr64.SizeOfUninitializedData));
 	cli_dbgmsg("AddressOfEntryPoint: 0x%x\n", vep);
667a4b35
 	cli_dbgmsg("BaseOfCode: 0x%x\n", EC32(optional_hdr64.BaseOfCode));
57866af1
 	cli_dbgmsg("SectionAlignment: 0x%x\n", EC32(optional_hdr64.SectionAlignment));
 	cli_dbgmsg("FileAlignment: 0x%x\n", EC32(optional_hdr64.FileAlignment));
667a4b35
 	cli_dbgmsg("MajorSubsystemVersion: %d\n", EC16(optional_hdr64.MajorSubsystemVersion));
 	cli_dbgmsg("MinorSubsystemVersion: %d\n", EC16(optional_hdr64.MinorSubsystemVersion));
57866af1
 	cli_dbgmsg("SizeOfImage: 0x%x\n", EC32(optional_hdr64.SizeOfImage));
 	cli_dbgmsg("SizeOfHeaders: 0x%x\n", EC32(optional_hdr64.SizeOfHeaders));
667a4b35
 	cli_dbgmsg("NumberOfRvaAndSizes: %d\n", EC32(optional_hdr64.NumberOfRvaAndSizes));
6307ca15
     }
 
3c45f3f4
     if (DETECT_BROKEN && (pe_plus?EC16(optional_hdr64.Subsystem):EC16(optional_hdr32.Subsystem))!= 1 && (!(pe_plus?EC32(optional_hdr64.SectionAlignment):EC32(optional_hdr32.SectionAlignment)) || (pe_plus?EC32(optional_hdr64.SectionAlignment):EC32(optional_hdr32.SectionAlignment))%0x1000)) {
57866af1
         cli_dbgmsg("Bad virtual alignemnt\n");
         if(ctx->virname)
 	    *ctx->virname = "Broken.Executable";
 	return CL_VIRUS;
e1e5af58
     }
 
3c45f3f4
     if (DETECT_BROKEN && (pe_plus?EC16(optional_hdr64.Subsystem):EC16(optional_hdr32.Subsystem))!= 1 && (!(pe_plus?EC32(optional_hdr64.FileAlignment):EC32(optional_hdr32.FileAlignment)) || (pe_plus?EC32(optional_hdr64.FileAlignment):EC32(optional_hdr32.FileAlignment))%0x200)) {
57866af1
         cli_dbgmsg("Bad file alignemnt\n");
 	if(ctx->virname)
 	    *ctx->virname = "Broken.Executable";
 	return CL_VIRUS;
e1e5af58
     }
 
667a4b35
     switch(pe_plus ? EC16(optional_hdr64.Subsystem) : EC16(optional_hdr32.Subsystem)) {
d17f081e
 	case 0:
 	    cli_dbgmsg("Subsystem: Unknown\n");
 	    break;
6307ca15
 	case 1:
3c45f3f4
 	    cli_dbgmsg("Subsystem: Native (svc)\n");
6307ca15
 	    break;
 	case 2:
6c9455c2
 	    cli_dbgmsg("Subsystem: Win32 GUI\n");
6307ca15
 	    break;
 	case 3:
6c9455c2
 	    cli_dbgmsg("Subsystem: Win32 console\n");
6307ca15
 	    break;
 	case 5:
6c9455c2
 	    cli_dbgmsg("Subsystem: OS/2 console\n");
6307ca15
 	    break;
 	case 7:
6c9455c2
 	    cli_dbgmsg("Subsystem: POSIX console\n");
6307ca15
 	    break;
399815d9
 	case 8:
 	    cli_dbgmsg("Subsystem: Native Win9x driver\n");
 	    break;
 	case 9:
 	    cli_dbgmsg("Subsystem: WinCE GUI\n");
 	    break;
 	case 10:
 	    cli_dbgmsg("Subsystem: EFI application\n");
 	    break;
 	case 11:
 	    cli_dbgmsg("Subsystem: EFI driver\n");
 	    break;
 	case 12:
 	    cli_dbgmsg("Subsystem: EFI runtime driver\n");
 	    break;
6307ca15
 	default:
667a4b35
 	    cli_warnmsg("Unknown subsystem in PE header (0x%x)\n", pe_plus ? EC16(optional_hdr64.Subsystem) : EC16(optional_hdr32.Subsystem));
6307ca15
     }
 
85dd8460
     cli_dbgmsg("------------------------------------\n");
6307ca15
 
cdbf8c8e
     if(fstat(desc, &sb) == -1) {
 	cli_dbgmsg("fstat failed\n");
 	return CL_EIO;
     }
 
e0264472
     fsize = sb.st_size;
 
a9082ea2
     section_hdr = (struct pe_image_section_hdr *) cli_calloc(nsections, sizeof(struct pe_image_section_hdr));
ac75a532
 
     if(!section_hdr) {
 	cli_dbgmsg("Can't allocate memory for section headers\n");
 	return CL_EMEM;
     }
 
57866af1
     exe_sections = (struct cli_exe_section *) cli_calloc(nsections, sizeof(struct cli_exe_section));
     
     if(!exe_sections) {
 	cli_dbgmsg("Can't allocate memory for section headers\n");
 	free(section_hdr);
 	return CL_EMEM;
     }
6307ca15
 
57866af1
     valign = (pe_plus)?EC32(optional_hdr64.SectionAlignment):EC32(optional_hdr32.SectionAlignment);
     falign = (pe_plus)?EC32(optional_hdr64.FileAlignment):EC32(optional_hdr32.FileAlignment);
 
     if(cli_readn(desc, section_hdr, sizeof(struct pe_image_section_hdr)*nsections) != (int)(nsections*sizeof(struct pe_image_section_hdr))) {
         cli_dbgmsg("Can't read section header\n");
 	cli_dbgmsg("Possibly broken PE file\n");
 	free(section_hdr);
 	free(exe_sections);
 	if(DETECT_BROKEN) {
 	    if(ctx->virname)
 		*ctx->virname = "Broken.Executable";
 	    return CL_VIRUS;
 	}
 	return CL_CLEAN;
     }
     
     for(i = 0; falign!=0x200 && i<nsections; i++) {
 	/* file alignment fallback mode - blah */
037f89cb
 	if (falign && section_hdr[i].SizeOfRawData && EC32(section_hdr[i].PointerToRawData)%falign && !(EC32(section_hdr[i].PointerToRawData)%0x200)) {
57866af1
 	    cli_dbgmsg("Found misaligned section, using 0x200\n");
 	    falign = 0x200;
6307ca15
 	}
57866af1
     }
6307ca15
 
57866af1
     for(i = 0; i < nsections; i++) {
8d3aca30
 	strncpy(sname, (char *) section_hdr[i].Name, 8);
6307ca15
 	sname[8] = 0;
57866af1
 	exe_sections[i].rva = PEALIGN(EC32(section_hdr[i].VirtualAddress), valign);
 	exe_sections[i].vsz = PESALIGN(EC32(section_hdr[i].VirtualSize), valign);
c1df0e6d
 	exe_sections[i].uvsz = EC32(section_hdr[i].VirtualSize);
57866af1
 	exe_sections[i].raw = PEALIGN(EC32(section_hdr[i].PointerToRawData), falign);
 	exe_sections[i].rsz = PESALIGN(EC32(section_hdr[i].SizeOfRawData), falign);
5f9d4c3b
 	exe_sections[i].ursz = EC32(section_hdr[i].SizeOfRawData);
3c45f3f4
 
 	if (!exe_sections[i].vsz && exe_sections[i].rsz)
 	    exe_sections[i].vsz=PESALIGN(EC32(section_hdr[i].SizeOfRawData), valign);
 
57866af1
 	if (exe_sections[i].rsz && fsize>exe_sections[i].raw && !CLI_ISCONTAINED(0, (uint32_t) fsize, exe_sections[i].raw, exe_sections[i].rsz))
 	    exe_sections[i].rsz = fsize - exe_sections[i].raw;
 	
7f3c1d03
 	cli_dbgmsg("Section %d\n", i);
6307ca15
 	cli_dbgmsg("Section name: %s\n", sname);
57866af1
 	cli_dbgmsg("Section data (from headers - in memory)\n");
 	cli_dbgmsg("VirtualSize: 0x%x 0x%x\n", EC32(section_hdr[i].VirtualSize), exe_sections[i].vsz);
 	cli_dbgmsg("VirtualAddress: 0x%x 0x%x\n", EC32(section_hdr[i].VirtualAddress), exe_sections[i].rva);
 	cli_dbgmsg("SizeOfRawData: 0x%x 0x%x\n", EC32(section_hdr[i].SizeOfRawData), exe_sections[i].rsz);
 	cli_dbgmsg("PointerToRawData: 0x%x 0x%x\n", EC32(section_hdr[i].PointerToRawData), exe_sections[i].raw);
6307ca15
 
a9082ea2
 	if(EC32(section_hdr[i].Characteristics) & 0x20) {
6c9455c2
 	    cli_dbgmsg("Section contains executable code\n");
 
57866af1
 	    if(exe_sections[i].vsz < exe_sections[i].rsz) {
6c9455c2
 		cli_dbgmsg("Section contains free space\n");
 		/*
 		cli_dbgmsg("Dumping %d bytes\n", section_hdr.SizeOfRawData - section_hdr.VirtualSize);
8000d078
 		ddump(desc, section_hdr.PointerToRawData + section_hdr.VirtualSize, section_hdr.SizeOfRawData - section_hdr.VirtualSize, cli_gentemp(NULL));
6c9455c2
 		*/
 
 	    }
 	}
6307ca15
 
a9082ea2
 	if(EC32(section_hdr[i].Characteristics) & 0x20000000)
6c9455c2
 	    cli_dbgmsg("Section's memory is executable\n");
9ad59d16
 
 	if(EC32(section_hdr[i].Characteristics) & 0x80000000)
 	    cli_dbgmsg("Section's memory is writeable\n");
 
85dd8460
 	cli_dbgmsg("------------------------------------\n");
6c9455c2
 
57866af1
 	if (DETECT_BROKEN && EC32(section_hdr[i].VirtualAddress)%valign) { /* Bad virtual alignment */
752f17ab
 	    cli_dbgmsg("VirtualAddress is misaligned\n");
 	    if(ctx->virname)
 	        *ctx->virname = "Broken.Executable";
 	    free(section_hdr);
57866af1
 	    free(exe_sections);
752f17ab
 	    return CL_VIRUS;
 	}
c09d6c19
 
57866af1
 	if (exe_sections[i].rsz) { /* Don't bother with virtual only sections */
 	    unsigned char md5_dig[16];
 	    if (exe_sections[i].raw >= fsize) { /* really broken */
 	        cli_dbgmsg("Broken PE file - Section %d starts beyond the end of file (Offset@ %d, Total filesize %d)\n", i, exe_sections[i].raw, fsize);
 		free(section_hdr);
 		free(exe_sections);
 		if(DETECT_BROKEN) {
 		    if(ctx->virname)
 		        *ctx->virname = "Broken.Executable";
 		    return CL_VIRUS;
 		}
 		return CL_CLEAN; /* no ninjas to see here! move along! */
 	    }
 	    
 	    /* check MD5 section sigs */
bc93eda0
 	    if(DCONF & PE_CONF_MD5SECT)
 		md5_sect = ctx->engine->md5_sect;
 	    else
 		md5_sect = NULL;
 
57866af1
 	    while(md5_sect && md5_sect->size < exe_sections[i].rsz)
 	        md5_sect = md5_sect->next;
 
 	    if(md5_sect && md5_sect->size == exe_sections[i].rsz) {
 	        if(!cli_md5sect(desc, exe_sections[i].raw, exe_sections[i].rsz, md5_dig)) {
 		    cli_errmsg("PE: Can't calculate MD5 for section %d\n", i);
 		} else {
 		    while(md5_sect && md5_sect->size == exe_sections[i].rsz) {
 		        if(!memcmp(md5_dig, md5_sect->md5, 16)) {
 			    if(ctx->virname)
 			        *ctx->virname = md5_sect->virname;
 			    free(section_hdr);
 			    free(exe_sections);
 			    return CL_VIRUS;
c09d6c19
 			}
57866af1
 			md5_sect = md5_sect->next;
c09d6c19
 		    }
 		}
 	    }
20c3d44d
 	}
 
85dd8460
 	if(!i) {
3c45f3f4
 	    if (DETECT_BROKEN && (pe_plus?EC16(optional_hdr64.Subsystem):EC16(optional_hdr32.Subsystem))!= 1 && EC32(section_hdr[i].VirtualAddress)!=valign) { /* Bad first section RVA */
752f17ab
 	        cli_dbgmsg("First section is in the wrong place\n");
 	        if(ctx->virname)
a9b1e8d2
 		    *ctx->virname = "Broken.Executable";
752f17ab
 		free(section_hdr);
57866af1
 		free(exe_sections);
752f17ab
 		return CL_VIRUS;
 	    }
57866af1
 	    min = exe_sections[i].rva;
 	    max = exe_sections[i].rva + exe_sections[i].rsz;
85dd8460
 	} else {
57866af1
 	    if (DETECT_BROKEN && EC32(section_hdr[i].VirtualAddress)-EC32(section_hdr[i-1].VirtualAddress)!= exe_sections[i-1].vsz) { /* No holes, no overlapping, no virtual disorder */
752f17ab
 	        cli_dbgmsg("Virtually misplaced section (wrong order, overlapping, non contiguous)\n");
 	        if(ctx->virname)
a9b1e8d2
 		    *ctx->virname = "Broken.Executable";
752f17ab
 		free(section_hdr);
57866af1
 		free(exe_sections);
752f17ab
 		return CL_VIRUS;
 	    }
57866af1
 	    if(exe_sections[i].rva < min)
 	        min = exe_sections[i].rva;
6c9455c2
 
57866af1
 	    if(exe_sections[i].rva + exe_sections[i].rsz > max)
 	        max = exe_sections[i].rva + exe_sections[i].rsz;
6c9455c2
 	}
6307ca15
 
bc93eda0
 	if(SCAN_ALGO && (DCONF & PE_CONF_POLIPOS) && !strlen(sname)) {
57866af1
 	    if(exe_sections[i].vsz > 40000 && exe_sections[i].vsz < 70000) {
be62f8ce
 		if(EC32(section_hdr[i].Characteristics) == 0xe0000060) {
 		    polipos = i;
 		}
 	    }
 	}
 
6307ca15
     }
 
57866af1
     if(!(ep = cli_rawaddr(vep, exe_sections, nsections, &err, fsize)) && err) {
 	cli_dbgmsg("EntryPoint out of file\n");
ac75a532
 	free(section_hdr);
57866af1
 	free(exe_sections);
20c3d44d
 	if(DETECT_BROKEN) {
3c91998b
 	    if(ctx->virname)
 		*ctx->virname = "Broken.Executable";
20c3d44d
 	    return CL_VIRUS;
 	}
342e27a5
 	return CL_CLEAN;
6307ca15
     }
 
342e27a5
     cli_dbgmsg("EntryPoint offset: 0x%x (%d)\n", ep, ep);
 
5c9300e7
     if(pe_plus) { /* Do not continue for PE32+ files */
 	free(section_hdr);
57866af1
 	free(exe_sections);
5c9300e7
 	return CL_CLEAN;
     }
 
41fd7c2f
     /* Attempt to detect some popular polymorphic viruses */
 
     /* W32.Parite.B */
bc93eda0
     if(SCAN_ALGO && (DCONF & PE_CONF_PARITE) && !dll && ep == exe_sections[nsections - 1].raw) {
d75187db
 	lseek(desc, ep, SEEK_SET);
77fcd089
 	if(cli_readn(desc, buff, 4096) == 4096) {
6a31c2b4
 		const char *pt = cli_memstr(buff, 4040, "\x47\x65\x74\x50\x72\x6f\x63\x41\x64\x64\x72\x65\x73\x73\x00", 15);
41fd7c2f
 	    if(pt) {
 		    uint32_t dw1, dw2;
 
 		pt += 15;
 		if(((dw1 = cli_readint32(pt)) ^ (dw2 = cli_readint32(pt + 4))) == 0x505a4f && ((dw1 = cli_readint32(pt + 8)) ^ (dw2 = cli_readint32(pt + 12))) == 0xffffb && ((dw1 = cli_readint32(pt + 16)) ^ (dw2 = cli_readint32(pt + 20))) == 0xb8) {
3c91998b
 		    *ctx->virname = "W32.Parite.B";
e0096ae1
 		    free(section_hdr);
57866af1
 		    free(exe_sections);
41fd7c2f
 		    return CL_VIRUS;
 		}
 	    }
 	}
     }
 
343316ab
     /* Kriz */
bc93eda0
     if(SCAN_ALGO && (DCONF & PE_CONF_KRIZ) && CLI_ISCONTAINED(exe_sections[nsections - 1].raw, exe_sections[nsections - 1].rsz, ep, 0x0fd2)) {
343316ab
 	cli_dbgmsg("in kriz\n");
 	lseek(desc, ep, SEEK_SET);
77fcd089
 	if(cli_readn(desc, buff, 200) == 200) {
82d4c989
 	    while (1) {
 		char *krizpos=buff+3;
 		char *krizmov, *krizxor;
 		int krizleft = 200-3;
 		int krizrega,krizregb;
 
 		if (buff[1]!='\x9c' || buff[2]!='\x60') break; /* EP+1 */
 		xckriz(&krizpos, &krizleft, 0, 8);
 		if (krizleft < 6 || *krizpos!='\xe8' || krizpos[2] || krizpos[3] || krizpos[4]) break; /* call DELTA */
 		krizleft-=5+(unsigned char)krizpos[1];
 		if (krizleft < 2) break;
 		krizpos+=5+(unsigned char)krizpos[1];
 		if (*krizpos<'\x58' || *krizpos>'\x5f' || *krizpos=='\x5c') break; /* pop DELTA */
 		krizrega=*krizpos-'\x58';
 		cli_dbgmsg("kriz: pop delta using %d\n", krizrega);
 		krizpos+=1;
 		krizleft-=1;
 		xckriz(&krizpos, &krizleft, 1, 8);
 		if (krizleft <6 || *krizpos<'\xb8' || *krizpos>'\xbf' || *krizpos=='\xbc' || cli_readint32(krizpos+1)!=0x0fd2) break;
 		krizregb=*krizpos-'\xb8';
 		if (krizrega==krizregb) break;
 		cli_dbgmsg("kriz: using %d for size\n", krizregb);
 		krizpos+=5;
 		krizleft-=5;
 		krizmov = krizpos;
 		xckriz(&krizpos, &krizleft, 0, 8);
 		krizxor=krizpos;
 		if (krizleft && *krizpos=='\x3e') {
 		    /* strip ds: */
 		    krizpos++;
 		    krizleft--;
 		}
 		if (krizleft<8 || *krizpos!='\x80' || (char)(krizpos[1]-krizrega)!='\xb0') {
 		    cli_dbgmsg("kriz: bogus opcode or register\n");
 		    break;
 		}
 		krizpos+=7;
 		krizleft-=7;
 		xckriz(&krizpos, &krizleft, 0, krizrega);
 		if (! krizleft || (char)(*krizpos-krizrega)!='\x48') break; /* dec delta */
 		krizpos++;
 		krizleft--;
 		cli_dbgmsg("kriz: dec delta found\n");
 		xckriz(&krizpos, &krizleft, 0, krizregb);
 		if (krizleft <4 || (char)(*krizpos-krizregb)!='\x48' || krizpos[1]!='\x75') break; /* dec size + jne loop */
 		if (krizpos+3+(int)krizpos[2]<krizmov || krizpos+3+(int)krizpos[2]>krizxor) {
 		    cli_dbgmsg("kriz: jmp back out of range (%d>%d>%d)\n", krizmov-(krizpos+3), (int)krizpos[2], krizxor-(krizpos+3));
 		    break;
343316ab
 		}
82d4c989
 		*ctx->virname = "Win32.Kriz";
 		free(section_hdr);
 		free(exe_sections);
 		return CL_VIRUS;
 	    }
343316ab
 	}
     }
 
9ad59d16
     /* W32.Magistr.A/B */
bc93eda0
     if(SCAN_ALGO && (DCONF & PE_CONF_MAGISTR) && !dll && (EC32(section_hdr[nsections - 1].Characteristics) & 0x80000000)) {
5f9d4c3b
 	    uint32_t rsize, vsize, dam = 0;
9ad59d16
 
c1df0e6d
 	vsize = exe_sections[nsections - 1].uvsz;
5f9d4c3b
 	rsize = exe_sections[nsections - 1].rsz;
 	if(rsize < exe_sections[nsections - 1].ursz) {
 	    rsize = exe_sections[nsections - 1].ursz;
 	    dam = 1;
 	}
9ad59d16
 
5f9d4c3b
 	if(vsize >= 0x612c && rsize >= 0x612c && ((vsize & 0xff) == 0xec)) {
9ad59d16
 		int bw = rsize < 0x7000 ? rsize : 0x7000;
 
82d4c989
 	    lseek(desc, exe_sections[nsections - 1].raw + rsize - bw, SEEK_SET);
77fcd089
 	    if(cli_readn(desc, buff, 4096) == 4096) {
9ad59d16
 		if(cli_memstr(buff, 4091, "\xe8\x2c\x61\x00\x00", 5)) {
5f9d4c3b
 		    *ctx->virname = dam ? "W32.Magistr.A.dam" : "W32.Magistr.A";
9ad59d16
 		    free(section_hdr);
57866af1
 		    free(exe_sections);
9ad59d16
 		    return CL_VIRUS;
 		} 
 	    }
 
 	} else if(rsize >= 0x7000 && vsize >= 0x7000 && ((vsize & 0xff) == 0xed)) {
 		int bw = rsize < 0x8000 ? rsize : 0x8000;
 
82d4c989
 	    lseek(desc, exe_sections[nsections - 1].raw + rsize - bw, SEEK_SET);
77fcd089
 	    if(cli_readn(desc, buff, 4096) == 4096) {
9ad59d16
 		if(cli_memstr(buff, 4091, "\xe8\x04\x72\x00\x00", 5)) {
5f9d4c3b
 		    *ctx->virname = dam ? "W32.Magistr.B.dam" : "W32.Magistr.B";
9ad59d16
 		    free(section_hdr);
57866af1
 		    free(exe_sections);
9ad59d16
 		    return CL_VIRUS;
 		} 
 	    }
 	}
     }
 
be62f8ce
     /* W32.Polipos.A */
5c9300e7
    if(polipos && !dll && nsections > 2 && nsections < 13 && e_lfanew <= 0x800 && (EC16(optional_hdr32.Subsystem) == 2 || EC16(optional_hdr32.Subsystem) == 3) && EC16(file_hdr.Machine) == 0x14c && optional_hdr32.SizeOfStackReserve >= 0x80000) {
57866af1
 		uint32_t remaining = exe_sections[0].rsz;
be62f8ce
 		uint32_t chunk = sizeof(buff);
8d3aca30
 		uint32_t val, shift, raddr, total = 0;
be62f8ce
 		const char *jpt;
 		struct offset_list *offlist = NULL, *offnode;
 
 
 	cli_dbgmsg("Detected W32.Polipos.A characteristics\n");
 
 	if(remaining < chunk)
 	    chunk = remaining;
 
57866af1
 	lseek(desc, exe_sections[0].raw, SEEK_SET);
be62f8ce
 	while((bytes = cli_readn(desc, buff, chunk)) > 0) {
 	    shift = 0;
57866af1
 	    while((uint32_t)bytes - 5 > shift) {
be62f8ce
 		jpt = buff + shift;
 		if(*jpt!='\xe9' && *jpt!='\xe8') {
 		    shift++;
 		    continue;
 		}
 		val = cli_readint32(jpt + 1);
57866af1
 		val += 5 + exe_sections[0].rva + total + shift;
 		raddr = cli_rawaddr(val, exe_sections, nsections, &err, fsize);
be62f8ce
 
57866af1
 		if(!err && (raddr >= exe_sections[polipos].raw && raddr < exe_sections[polipos].raw + exe_sections[polipos].rsz) && (!offlist || (raddr != offlist->offset))) {
be62f8ce
 		    offnode = (struct offset_list *) cli_malloc(sizeof(struct offset_list));
 		    if(!offnode) {
 			free(section_hdr);
57866af1
 			free(exe_sections);
be62f8ce
 			while(offlist) {
 			    offnode = offlist;
 			    offlist = offlist->next;
 			    free(offnode);
 			}
 			return CL_EMEM;
 		    }
 		    offnode->offset = raddr;
 		    offnode->next = offlist;
 		    offlist = offnode;
 		}
 
 		shift++;
 	    }
 
 	    if(remaining < chunk) {
 		chunk = remaining;
 	    } else {
 		remaining -= bytes;
 		if(remaining < chunk) {
 		    chunk = remaining;
 		}
 	    }
 
 	    if(!remaining)
 		break;
 
 	    total += bytes;
 	}
 
 	offnode = offlist;
 	while(offnode) {
 	    cli_dbgmsg("Polipos: Checking offset 0x%x (%u)", offnode->offset, offnode->offset);
 	    lseek(desc, offnode->offset, SEEK_SET);
 	    if(cli_readn(desc, buff, 9) == 9) {
 		ubuff = (unsigned char *) buff;
 		if(ubuff[0] == 0x55 && ubuff[1] == 0x8b && ubuff[2] == 0xec &&
 		   ((ubuff[3] == 0x83 && ubuff[4] == 0xec && ubuff[6] == 0x60) ||  ubuff[3] == 0x60 ||
 		     (ubuff[3] == 0x81 && ubuff[4] == 0xec && ubuff[7] == 0x00 && ubuff[8] == 0x00))) {
 		    ret = CL_VIRUS;
 		    *ctx->virname = "W32.Polipos.A";
 		    break;
 		}
 	    }
 
 	    offnode = offnode->next;
 	}
 
 	while(offlist) {
 	    offnode = offlist;
 	    offlist = offlist->next;
 	    free(offnode);
 	}
 
 	if(ret == CL_VIRUS) {
 	    free(section_hdr);
57866af1
 	    free(exe_sections);
be62f8ce
 	    return CL_VIRUS;
 	}
     }
 
3fcb62ca
     /* SUE */
     
bc93eda0
     if((DCONF & PE_CONF_SUE) && nsections > 2 && vep == exe_sections[nsections - 1].rva && exe_sections[nsections - 1].rsz > 0x350 && exe_sections[nsections - 1].rsz < 0x292+0x350+1000) {
3fcb62ca
   
       
       char *sue=buff+0x74;
f35ffb91
       uint32_t key = 0;
3fcb62ca
       
       if(lseek(desc, ep-4, SEEK_SET) == -1) {
57866af1
 	cli_dbgmsg("SUE: lseek() failed\n");
3fcb62ca
 	free(section_hdr);
57866af1
 	free(exe_sections);
3fcb62ca
 	return CL_EIO;
       }
57866af1
       if((unsigned int) cli_readn(desc, buff, exe_sections[nsections - 1].rsz+4) == exe_sections[nsections - 1].rsz+4) {
3fcb62ca
 	found=0;
57866af1
 	while(CLI_ISCONTAINED(buff+4, exe_sections[nsections - 1].rsz, sue, 4*3)) {
3fcb62ca
 	  if((cli_readint32(sue)^cli_readint32(sue+4))==0x5c41090e && (cli_readint32(sue)^cli_readint32(sue+8))==0x021e0145) {
 	    found=1;
 	    key=(cli_readint32(sue)^0x6e72656b);
 	    break;
 	  }
 	  sue++;
 	}
 	cli_dbgmsg("SUE: key(%x) found @%x\n", key, sue-buff);
57866af1
 	if (found && CLI_ISCONTAINED(buff, exe_sections[nsections - 1].rsz, sue-0x74, 0xbe) &&
 	    (sue=sudecrypt(desc, fsize, exe_sections, nsections-1, sue, key, cli_readint32(buff), e_lfanew))) {
3fcb62ca
 	  if(!(tempfile = cli_gentemp(NULL))) {
 	    free(sue);
 	    free(section_hdr);
57866af1
 	    free(exe_sections);
3fcb62ca
 	    return CL_EMEM;
 	  }
57866af1
 
c1fdde8a
 	  if((ndesc = open(tempfile, O_RDWR|O_CREAT|O_TRUNC|O_BINARY, S_IRWXU)) < 0) {
3fcb62ca
 	    cli_dbgmsg("sue: Can't create file %s\n", tempfile);
 	    free(tempfile);
 	    free(sue);
 	    free(section_hdr);
57866af1
 	    free(exe_sections);
3fcb62ca
 	    return CL_EIO;
 	  }
 	  
57866af1
 	  if((unsigned int) cli_writen(ndesc, sue, ep) != ep) {
3fcb62ca
 	    cli_dbgmsg("sue: Can't write %d bytes\n", ep);
 	    close(ndesc);
 	    free(tempfile);
 	    free(sue);
 	    free(section_hdr);
57866af1
 	    free(exe_sections);
3fcb62ca
 	    return CL_EIO;
 	  }
 
 	  free(sue);
 	  if (cli_leavetemps_flag)
 	    cli_dbgmsg("SUE: Decrypted executable saved in %s\n", tempfile);
 	  else
 	    cli_dbgmsg("SUE: Executable decrypted\n");
 	  fsync(ndesc);
 	  lseek(ndesc, 0, SEEK_SET);
 
 	  if(cli_magic_scandesc(ndesc, ctx) == CL_VIRUS) {
 	    free(section_hdr);
57866af1
 	    free(exe_sections);
3fcb62ca
 	    close(ndesc);
 	    if(!cli_leavetemps_flag)
 	      unlink(tempfile);
 	    free(tempfile);
 	    return CL_VIRUS;
 	  }
 	  close(ndesc);
 	  if(!cli_leavetemps_flag)
 	    unlink(tempfile);
 	  free(tempfile);
 	}
       }
 
     }
 
4aa4a05c
     /* UPX, FSG, MEW support */
a9082ea2
 
     /* try to find the first section with physical size == 0 */
     found = 0;
b6aee321
     if(DCONF & (PE_CONF_UPX | PE_CONF_FSG | PE_CONF_MEW)) {
bc93eda0
 	for(i = 0; i < (unsigned int) nsections - 1; i++) {
 	    if(!section_hdr[i].SizeOfRawData && section_hdr[i].VirtualSize && section_hdr[i + 1].SizeOfRawData && section_hdr[i + 1].VirtualSize) {
 		found = 1;
4aa4a05c
 		cli_dbgmsg("UPX/FSG/MEW: empty section found - assuming compression\n");
bc93eda0
 		break;
 	    }
a9082ea2
 	}
     }
 
4aa4a05c
     /* MEW support */
b6aee321
     if (found && (DCONF & PE_CONF_MEW)) {
4aa4a05c
 	uint32_t fileoffset;
 	/* Check EP for MEW */
 	if(lseek(desc, ep, SEEK_SET) == -1) {
 	    cli_dbgmsg("MEW: lseek() failed\n");
 	    free(section_hdr);
91ad9330
 	    free(exe_sections);
4aa4a05c
 	    return CL_EIO;
 	}
 
         if((bytes = read(desc, buff, 25)) != 25 && bytes < 16) {
 	    cli_dbgmsg("MEW: Can't read at least 16 bytes at 0x%x (%d) %d\n", ep, ep, bytes);
 	    cli_dbgmsg("MEW: Broken or not compressed file\n");
             free(section_hdr);
91ad9330
 	    free(exe_sections);
4aa4a05c
 	    return CL_CLEAN;
 	}
 
 	fileoffset = (vep + cli_readint32(buff + 1) + 5);
 	do {
 	    if (found && (buff[0] == '\xe9') && (fileoffset == 0x154 || fileoffset == 0x158))
 	    {
 		uint32_t offdiff, uselzma;
 
 		cli_dbgmsg ("MEW characteristics found: %08X + %08X + 5 = %08X\n", 
 			cli_readint32(buff + 1), vep, cli_readint32(buff + 1) + vep + 5);
 
 		if(lseek(desc, fileoffset, SEEK_SET) == -1) {
 		    cli_dbgmsg("MEW: lseek() failed\n");
 		    free(section_hdr);
91ad9330
 		    free(exe_sections);
4aa4a05c
 		    return CL_EIO;
 		}
 
 		if((bytes = read(desc, buff, 0xb0)) != 0xb0) {
 		    cli_dbgmsg("MEW: Can't read 0xb0 bytes at 0x%x (%d) %d\n", fileoffset, fileoffset, bytes);
 		    break;
 		}
 
 		if (fileoffset == 0x154) 
 		    cli_dbgmsg("MEW: Win9x compatibility was set!\n");
 		else
 		    cli_dbgmsg("MEW: Win9x compatibility was NOT set!\n");
 
 		/* is it always 0x1C and 0x21C or not */
91ad9330
 		if((offdiff = cli_readint32(buff+1) - EC32(optional_hdr32.ImageBase)) <= exe_sections[i + 1].rva || offdiff >= exe_sections[i + 1].rva + exe_sections[i + 1].raw - 4)
4aa4a05c
 		{
 		    cli_dbgmsg("MEW: ESI is not in proper section\n");
 		    break;
 		}
91ad9330
 		offdiff -= exe_sections[i + 1].rva;
4aa4a05c
 
91ad9330
 		if(lseek(desc, exe_sections[i + 1].raw, SEEK_SET) == -1) {
4aa4a05c
 		    cli_dbgmsg("MEW: lseek() failed\n"); /* ACAB: lseek won't fail here but checking doesn't hurt even */
 		    free(section_hdr);
91ad9330
 		    free(exe_sections);
4aa4a05c
 		    return CL_EIO;
 		}
91ad9330
 		ssize = exe_sections[i + 1].vsz;
 		dsize = exe_sections[i].vsz;
4aa4a05c
 
 		cli_dbgmsg("MEW: ssize %08x dsize %08x offdiff: %08x\n", ssize, dsize, offdiff);
91ad9330
 		if(ctx->limits && ctx->limits->maxfilesize && (ssize + dsize > ctx->limits->maxfilesize || exe_sections[i + 1].rsz > ctx->limits->maxfilesize)) {
4aa4a05c
 		    cli_dbgmsg("MEW: Sizes exceeded (ssize: %u, dsize: %u, max: %lu)\n", ssize, dsize , ctx->limits->maxfilesize);
 		    free(section_hdr);
91ad9330
 		    free(exe_sections);
4aa4a05c
 		    if(BLOCKMAX) {
 			*ctx->virname = "PE.MEW.ExceededFileSize";
 			return CL_VIRUS;
 		    } else {
 			return CL_CLEAN;
 		    }
 		}
 
 		/* allocate needed buffer */
 		if (!(src = cli_calloc (ssize + dsize, sizeof(char)))) {
 		    free(section_hdr);
91ad9330
 		    free(exe_sections);
4aa4a05c
 		    return CL_EMEM;
 		}
 
91ad9330
 		if (exe_sections[i + 1].rsz < offdiff + 12 || exe_sections[i + 1].rsz > ssize)
4aa4a05c
 		{
91ad9330
 		    cli_dbgmsg("MEW: Size mismatch: %08x\n", exe_sections[i + 1].rsz);
4aa4a05c
 		    free(src);
 		    break;
 		}
 
91ad9330
 		if((bytes = read(desc, src + dsize, exe_sections[i + 1].rsz)) != exe_sections[i + 1].rsz) {
 		    cli_dbgmsg("MEW: Can't read %d bytes [readed: %d]\n", exe_sections[i + 1].rsz, bytes);
4aa4a05c
 		    free(section_hdr);
91ad9330
 		    free(exe_sections);
4aa4a05c
 		    free(src);
 		    return CL_EIO;
 		}
 		cli_dbgmsg("MEW: %d (%08x) bytes read\n", bytes, bytes);
 		/* count offset to lzma proc, if lzma used, 0xe8 -> call */
 		if (buff[0x7b] == '\xe8')
 		{
91ad9330
 		    if (!CLI_ISCONTAINED(exe_sections[1].rva, exe_sections[1].vsz, cli_readint32(buff + 0x7c) + fileoffset + 0x80, 4))
4aa4a05c
 		    {
 			cli_dbgmsg("MEW: lzma proc out of bounds!\n");
 			free(src);
 			break; /* to next unpacker in chain */
 		    }
91ad9330
 		    uselzma = cli_readint32(buff + 0x7c) - (exe_sections[0].rva - fileoffset - 0x80);
4aa4a05c
 		} else
 		    uselzma = 0;
 
 		if(!(tempfile = cli_gentemp(NULL))) {
 		    free(section_hdr);
91ad9330
 		    free(exe_sections);
4aa4a05c
 		    free(src);
 		    return CL_EMEM;
 		}
 		if((ndesc = open(tempfile, O_RDWR|O_CREAT|O_TRUNC, S_IRWXU)) < 0) {
 		    cli_dbgmsg("MEW: Can't create file %s\n", tempfile);
 		    free(tempfile);
 		    free(section_hdr);
91ad9330
 		    free(exe_sections);
4aa4a05c
 		    free(src);
 		    return CL_EIO;
 		}
 		dest = src;
91ad9330
 		switch(unmew11(i, src, offdiff, ssize, dsize, EC32(optional_hdr32.ImageBase), exe_sections[0].rva, uselzma, NULL, NULL, ndesc)) {
4aa4a05c
 		    case 1: /* Everything OK */
 			cli_dbgmsg("MEW: Unpacked and rebuilt executable saved in %s\n", tempfile);
 			free(src);
 			fsync(ndesc);
 			lseek(ndesc, 0, SEEK_SET);
 
 			cli_dbgmsg("***** Scanning rebuilt PE file *****\n");
 			if(cli_magic_scandesc(ndesc, ctx) == CL_VIRUS) {
 			    free(section_hdr);
91ad9330
 			    free(exe_sections);
4aa4a05c
 			    close(ndesc);
 			    if(!cli_leavetemps_flag)
 				unlink(tempfile);
 			    free(tempfile);
 			    return CL_VIRUS;
 			}
 			close(ndesc);
 			if(!cli_leavetemps_flag)
 			    unlink(tempfile);
 			free(tempfile);
 			free(section_hdr);
91ad9330
 			free(exe_sections);
4aa4a05c
 			return CL_CLEAN;
 		    default: /* Everything gone wrong */
 			cli_dbgmsg("MEW: Unpacking failed\n");
 			close(ndesc);
 			unlink(tempfile); /* It's empty anyway */
 			free(tempfile);
 			free(src);
 			break;
 		}
 	    }
 	} while (0);
     }
 
e8042398
     if(found || upack) {
 	/* Check EP for UPX vs. FSG vs. Upack */
5f1a932b
 	if(lseek(desc, ep, SEEK_SET) == -1) {
 	    cli_dbgmsg("UPX/FSG: lseek() failed\n");
1a24f559
 	    free(section_hdr);
57866af1
 	    free(exe_sections);
5f1a932b
 	    return CL_EIO;
03a2d04a
 	}
 
77fcd089
         if(cli_readn(desc, buff, 168) != 168) {
f628a181
 	    cli_dbgmsg("UPX/FSG: Can't read 168 bytes at 0x%x (%d)\n", ep, ep);
18b405d4
 	    cli_dbgmsg("UPX/FSG: Broken or not UPX/FSG compressed file\n");
5f1a932b
             free(section_hdr);
57866af1
 	    free(exe_sections);
18b405d4
 	    return CL_CLEAN;
5ae8bdd5
 	}
 
e8042398
 	/* Upack 0.39 produces 2 types of executables
 	 * 3 sections:           | 2 sections (one empty, I don't chech found if !upack, since it's in OR above):
 	 *   mov esi, value      |   pusha
 	 *   lodsd               |   call $+0x9
 	 *   push eax            |
 	 *
 	 * Upack 1.1/1.2 Beta produces [based on 2 samples (sUx) provided by aCaB]:
 	 * 2 sections
 	 *   mov esi, value
 	 *   loads
 	 *   mov edi, eax
 	 *
 	 * Upack unknown [sample 0297729]
 	 * 3 sections
 	 *   mov esi, value
 	 *   push [esi]
 	 *   jmp
 	 * 
 	 */
 	/* upack 0.39-3s + sample 0151477*/
  	if((upack && buff[0] == '\xbe' && cli_readint32(buff + 1) - EC32(optional_hdr32.ImageBase) > min && /* mov esi */
 				buff[5] == '\xad' && buff[6] == '\x50' && /* lodsd; push eax */
 				EC16(file_hdr.NumberOfSections) == 3) || /* 3 sections */
 			/* based on 0297729 sample from aCaB */
 			(upack && buff[0] == '\xbe' && cli_readint32(buff + 1) - EC32(optional_hdr32.ImageBase) > min && /* mov esi */
 			 buff[5] == '\xff' && buff[6] == '\x36' && /* push [esi] */
 			 EC16(file_hdr.NumberOfSections) == 3) ||
 			/* upack 0.39-2s */
 			(!upack && buff[0] == '\x60' && buff[1] == '\xe8' && cli_readint32(buff+2) == 0x9 && /* pusha; call+9 */
 			 EC16(file_hdr.NumberOfSections) == 2) || /* 2 sections */
 			/* upack 1.1/1.2, based on 2 samples */
 			(!upack && buff[0] == '\xbe' && cli_readint32(buff+1) - EC32(optional_hdr32.ImageBase) < min &&  /* mov esi */
 			 cli_readint32(buff + 1) - EC32(optional_hdr32.ImageBase) > 0 && 
 			 buff[5] == '\xad' && buff[6] == '\x8b' && buff[7] == '\xf8' && /* loads;  mov edi, eax */
 			 EC16(file_hdr.NumberOfSections) == 2)) { /* 2 sections */
 		uint32_t vma, off;
 		int a,b,c, file;
 
 		cli_dbgmsg("Upack characteristics found.\n");
 		a = EC32(section_hdr[0].VirtualSize);
 		b = EC32(section_hdr[1].VirtualSize);
 		if (upack) {
 			cli_dbgmsg("upack var set\n");
 			c = EC32(section_hdr[2].VirtualSize);
 			ssize = EC32(section_hdr[0].SizeOfRawData) + EC32(section_hdr[0].PointerToRawData);
 			off = EC32(section_hdr[0].VirtualAddress);
 			vma = EC32(optional_hdr32.ImageBase) + EC32(section_hdr[0].VirtualAddress);
 		} else {
 			cli_dbgmsg("upack var NOT set\n");
 			c = EC32(section_hdr[1].VirtualAddress);
 			ssize = EC32(section_hdr[1].PointerToRawData);
 			off = 0;
 			vma = EC32(section_hdr[1].VirtualAddress) - EC32(section_hdr[1].PointerToRawData);
 		}
 
 		dsize = a+b+c;
 		if (ctx->limits && ctx->limits->maxfilesize && (dsize > ctx->limits->maxfilesize || ssize > ctx->limits->maxfilesize || EC32(section_hdr[1].SizeOfRawData) > ctx->limits->maxfilesize))
 		{
 		    cli_dbgmsg("Upack: Sizes exceeded (a: %u, b: %u, c: %ux, max: %lu)\n", a, b, c, ctx->limits->maxfilesize);
 		    free(section_hdr);
d426b12e
 		    free(exe_sections);
e8042398
 		    if(BLOCKMAX) {
 			*ctx->virname = "PE.Upack.ExceededFileSize";
 			return CL_VIRUS;
 		    } else {
 			return CL_CLEAN;
 		    }
 		}
 		/* these are unsigned so if vaddr - off < 0, it should be ok */
 		if (EC32(section_hdr[1].VirtualAddress) - off > dsize || EC32(section_hdr[1].VirtualAddress) - off > dsize - EC32(section_hdr[1].SizeOfRawData) || (upack && (EC32(section_hdr[2].VirtualAddress) - EC32(section_hdr[0].VirtualAddress) > dsize || EC32(section_hdr[2].VirtualAddress) - EC32(section_hdr[0].VirtualAddress) > dsize - ssize)) || ssize > dsize)
 		{
 		    cli_dbgmsg("Upack: probably malformed pe-header, skipping to next unpacker\n");
 		    goto skip_upack_and_go_to_next_unpacker; /* I didn't want to add additional do while + break, can it be this way ? */
 		}
 			
 		if((dest = (char *) cli_calloc(dsize, sizeof(char))) == NULL) {
 		    free(section_hdr);
d426b12e
 		    free(exe_sections);
e8042398
 		    return CL_EMEM;
 		}
 		src = NULL;
 		cli_dbgmsg("Upack: min: %08x %08x max: %08x\n", dest, a+b+c, dest+a+b+c);
 	
 		lseek(desc, 0, SEEK_SET);
 		if(read(desc, dest, ssize) != ssize) { /* 2vGiM: i think this can be overflowed - should you check for ssize < dsize ?
 		                                        * yup, I think you're right, added above
 							*/
 		    cli_dbgmsg("Upack: Can't read raw data of section 0\n");
 		    free(section_hdr);
d426b12e
 		    free(exe_sections);
e8042398
 		    free(dest);
 		    return CL_EIO;
 		}
 
 		if (upack)
 			memmove(dest + EC32(section_hdr[2].VirtualAddress) - EC32(section_hdr[0].VirtualAddress), dest, ssize);
 
 		lseek(desc, EC32(section_hdr[1].PointerToRawData), SEEK_SET);
 
 		if(read(desc, dest+EC32(section_hdr[1].VirtualAddress) - off, EC32(section_hdr[1].SizeOfRawData)) != EC32(section_hdr[1].SizeOfRawData)) {
 		    cli_dbgmsg("Upack: Can't read raw data of section 1\n");
 		    free(section_hdr);
d426b12e
 		    free(exe_sections);
e8042398
 		    free(dest);
 		    return CL_EIO;
 		}
 
d426b12e
 		if(!(tempfile = cli_gentemp(NULL))) {
 		    free(section_hdr);
 		    free(exe_sections);
 		    free(dest);
e8042398
 		    return CL_EMEM;
d426b12e
 		}
e8042398
 
 		if((file = open(tempfile, O_RDWR|O_CREAT|O_TRUNC, S_IRWXU)) < 0) {
 		    cli_dbgmsg("Upack: Can't create file %s\n", tempfile);
 		    free(tempfile);
 		    free(section_hdr);
d426b12e
 		    free(exe_sections);
e8042398
 		    free(dest);
 		    return CL_EIO;
 		}
 
 		switch (unupack(upack, dest, dsize, buff, vma, ep, EC32(optional_hdr32.ImageBase), EC32(section_hdr[0].VirtualAddress), file))
 		{
 			case 1: /* Everything OK */
 				cli_dbgmsg("Upack: Unpacked and rebuilt executable saved in %s\n", tempfile);
 				free(dest);
 				fsync(file);
 				lseek(file, 0, SEEK_SET);
 
 				cli_dbgmsg("***** Scanning rebuilt PE file *****\n");
 				if(cli_magic_scandesc(file, ctx) == CL_VIRUS) {
 					free(section_hdr);
d426b12e
 					free(exe_sections);
e8042398
 					close(file);
 					if(!cli_leavetemps_flag)
 						unlink(tempfile);
 					free(tempfile);
 					return CL_VIRUS;
 				}
 
 				close(file);
 				if(!cli_leavetemps_flag)
 					unlink(tempfile);
 				free(tempfile);
 				free(section_hdr);
d426b12e
 				free(exe_sections);
e8042398
 				return CL_CLEAN;
 
 			default: /* Everything gone wrong */
 				cli_dbgmsg("Upack: Unpacking failed\n");
 				close(file);
 				unlink(tempfile); /* It's empty anyway */
 				free(tempfile);
 				free(dest);
 				break;
 		}
 	}
 skip_upack_and_go_to_next_unpacker:
 
bc93eda0
 	if((DCONF & PE_CONF_FSG) && buff[0] == '\x87' && buff[1] == '\x25') {
342e27a5
 
5eb34fac
 	    /* FSG v2.0 support - thanks to aCaB ! */
342e27a5
 
57866af1
 	    ssize = exe_sections[i + 1].rsz;
 	    dsize = exe_sections[i].vsz;
342e27a5
 
5f1a932b
 	    while(found) {
 		    uint32_t newesi, newedi, newebx, newedx;
03a2d04a
 
3c91998b
 		if(ctx->limits && ctx->limits->maxfilesize && (ssize > ctx->limits->maxfilesize || dsize > ctx->limits->maxfilesize)) {
e2ff1490
 		    cli_dbgmsg("FSG: Sizes exceeded (ssize: %u, dsize: %u, max: %lu)\n", ssize, dsize , ctx->limits->maxfilesize);
5f1a932b
 		    free(section_hdr);
57866af1
 		    free(exe_sections);
ec99a10f
 		    if(BLOCKMAX) {
3c91998b
 			*ctx->virname = "PE.FSG.ExceededFileSize";
ec99a10f
 			return CL_VIRUS;
 		    } else {
 			return CL_CLEAN;
 		    }
5f1a932b
 		}
03a2d04a
 
5f1a932b
 		if(ssize <= 0x19 || dsize <= ssize) {
 		    cli_dbgmsg("FSG: Size mismatch (ssize: %d, dsize: %d)\n", ssize, dsize);
 		    free(section_hdr);
57866af1
 		    free(exe_sections);
5f1a932b
 		    return CL_CLEAN;
 		}
 
57866af1
 		newedx = cli_readint32(buff + 2) - EC32(optional_hdr32.ImageBase);
 		if(!CLI_ISCONTAINED(exe_sections[i + 1].rva, exe_sections[i + 1].rsz, newedx, 4)) {
5f1a932b
 		    cli_dbgmsg("FSG: xchg out of bounds (%x), giving up\n", newedx);
 		    break;
 		}
 
 		if((src = (char *) cli_malloc(ssize)) == NULL) {
 		    free(section_hdr);
57866af1
 		    free(exe_sections);
5f1a932b
 		    return CL_EMEM;
 		}
 
57866af1
 		lseek(desc, exe_sections[i + 1].raw, SEEK_SET);
77fcd089
 		if((unsigned int) cli_readn(desc, src, ssize) != ssize) {
57866af1
 		    cli_dbgmsg("Can't read raw data of section %d\n", i + 1);
5f1a932b
 		    free(section_hdr);
57866af1
 		    free(exe_sections);
5f1a932b
 		    free(src);
 		    return CL_EIO;
 		}
 
57866af1
 		dest = src + newedx - exe_sections[i + 1].rva;
 		if(newedx < exe_sections[i + 1].rva || !CLI_ISCONTAINED(src, ssize, dest, 4)) {
5f1a932b
 		    cli_dbgmsg("FSG: New ESP out of bounds\n");
 		    free(src);
 		    break;
 		}
 
57866af1
 		newedx = cli_readint32(dest) - EC32(optional_hdr32.ImageBase);
 		if(!CLI_ISCONTAINED(exe_sections[i + 1].rva, exe_sections[i + 1].rsz, newedx, 4)) {
5f1a932b
 		    cli_dbgmsg("FSG: New ESP (%x) is wrong\n", newedx);
 		    free(src);
 		    break;
 		}
  
57866af1
 		dest = src + newedx - exe_sections[i + 1].rva;
 		if(!CLI_ISCONTAINED(src, ssize, dest, 32)) {
5f1a932b
 		    cli_dbgmsg("FSG: New stack out of bounds\n");
 		    free(src);
 		    break;
 		}
 
667a4b35
 		newedi = cli_readint32(dest) - EC32(optional_hdr32.ImageBase);
 		newesi = cli_readint32(dest + 4) - EC32(optional_hdr32.ImageBase);
 		newebx = cli_readint32(dest + 16) - EC32(optional_hdr32.ImageBase);
5f1a932b
 		newedx = cli_readint32(dest + 20);
 
57866af1
 		if(newedi != exe_sections[i].rva) {
 		    cli_dbgmsg("FSG: Bad destination buffer (edi is %x should be %x)\n", newedi, exe_sections[i].rva);
5f1a932b
 		    free(src);
 		    break;
 		}
 
57866af1
 		if(newesi < exe_sections[i + 1].rva || newesi - exe_sections[i + 1].rva >= exe_sections[i + 1].rsz) {
5f1a932b
 		    cli_dbgmsg("FSG: Source buffer out of section bounds\n");
 		    free(src);
 		    break;
 		}
 
57866af1
 		if(!CLI_ISCONTAINED(exe_sections[i + 1].rva, exe_sections[i + 1].rsz, newebx, 16)) {
5f1a932b
 		    cli_dbgmsg("FSG: Array of functions out of bounds\n");
 		    free(src);
 		    break;
 		}
 
57866af1
 		newedx=cli_readint32(newebx + 12 - exe_sections[i + 1].rva + src) - EC32(optional_hdr32.ImageBase);
8080fbe3
 		cli_dbgmsg("FSG: found old EP @%x\n",newedx);
5f1a932b
 
 		if((dest = (char *) cli_calloc(dsize, sizeof(char))) == NULL) {
 		    free(section_hdr);
57866af1
 		    free(exe_sections);
5f1a932b
 		    free(src);
 		    return CL_EMEM;
 		}
 
b6f3826f
 		if(!(tempfile = cli_gentemp(NULL))) {
 		    free(section_hdr);
57866af1
 		    free(exe_sections);
b6f3826f
 		    free(src);
1ff5f3b8
 		    free(dest);
e0264472
 		    return CL_EMEM;
b6f3826f
 		}
e0264472
 
c1fdde8a
 		if((ndesc = open(tempfile, O_RDWR|O_CREAT|O_TRUNC|O_BINARY, S_IRWXU)) < 0) {
8080fbe3
 		    cli_dbgmsg("FSG: Can't create file %s\n", tempfile);
 		    free(tempfile);
 		    free(section_hdr);
57866af1
 		    free(exe_sections);
5f1a932b
 		    free(src);
 		    free(dest);
8080fbe3
 		    return CL_EIO;
 		}
 		
57866af1
 		switch (unfsg_200(newesi - exe_sections[i + 1].rva + src, dest, ssize + exe_sections[i + 1].rva - newesi, dsize, newedi, EC32(optional_hdr32.ImageBase), newedx, ndesc)) {
8080fbe3
 		    case 1: /* Everything OK */
 			cli_dbgmsg("FSG: Unpacked and rebuilt executable saved in %s\n", tempfile);
 			free(src);
 			free(dest);
 			fsync(ndesc);
 			lseek(ndesc, 0, SEEK_SET);
 
 			cli_dbgmsg("***** Scanning rebuilt PE file *****\n");
3c91998b
 			if(cli_magic_scandesc(ndesc, ctx) == CL_VIRUS) {
8080fbe3
 			    free(section_hdr);
57866af1
 			    free(exe_sections);
8080fbe3
 			    close(ndesc);
 			    if(!cli_leavetemps_flag)
 				unlink(tempfile);
 			    free(tempfile);
 			    return CL_VIRUS;
 			}
 
 			close(ndesc);
 			if(!cli_leavetemps_flag)
 			    unlink(tempfile);
 			free(tempfile);
 			free(section_hdr);
57866af1
 			free(exe_sections);
8080fbe3
 			return CL_CLEAN;
 
 		    case 0: /* We've got an unpacked buffer, no exe though */
57866af1
 			cli_dbgmsg("FSG: Successfully decompressed\n");
8080fbe3
 			close(ndesc);
 			unlink(tempfile);
 			free(tempfile);
 			found = 0;
 			upx_success = 1;
 			break; /* Go and scan the buffer! */
 
 		    default: /* Everything gone wrong */
 			cli_dbgmsg("FSG: Unpacking failed\n");
 			close(ndesc);
8d3aca30
 			unlink(tempfile); /* It's empty anyway */
8080fbe3
 			free(tempfile);
 			free(src);
 			free(dest);
 			break;
5f1a932b
 		}
 
fe0f6611
 		break; /* were done with 2 */
03a2d04a
 	    }
 	}
 
bc93eda0
  	if(found && (DCONF & PE_CONF_FSG) && buff[0] == '\xbe' && cli_readint32(buff + 1) - EC32(optional_hdr32.ImageBase) < min) {
5eb34fac
 
 	    /* FSG support - v. 1.33 (thx trog for the many samples) */
 
57866af1
 	    ssize = exe_sections[i + 1].rsz;
 	    dsize = exe_sections[i].vsz;
5eb34fac
 
 	    while(found) {
57866af1
 	            int sectcnt = 0;
5eb34fac
 		    char *support;
57866af1
 		    uint32_t newesi, newedi, newebx, oldep, gp, t;
 		    struct cli_exe_section *sections;
5eb34fac
 
 
3c91998b
 		if(ctx->limits && ctx->limits->maxfilesize && (ssize > ctx->limits->maxfilesize || dsize > ctx->limits->maxfilesize)) {
e2ff1490
 		    cli_dbgmsg("FSG: Sizes exceeded (ssize: %u, dsize: %u, max: %lu)\n", ssize, dsize, ctx->limits->maxfilesize);
5eb34fac
 		    free(section_hdr);
57866af1
 		    free(exe_sections);
ec99a10f
 		    if(BLOCKMAX) {
3c91998b
 			*ctx->virname = "PE.FSG.ExceededFileSize";
ec99a10f
 			return CL_VIRUS;
 		    } else {
 			return CL_CLEAN;
 		    }
5eb34fac
 		}
 
 		if(ssize <= 0x19 || dsize <= ssize) {
 		    cli_dbgmsg("FSG: Size mismatch (ssize: %d, dsize: %d)\n", ssize, dsize);
 		    free(section_hdr);
57866af1
 		    free(exe_sections);
5eb34fac
 		    return CL_CLEAN;
 		}
 
57866af1
 		if(!(gp = cli_rawaddr(cli_readint32(buff + 1) - EC32(optional_hdr32.ImageBase), NULL, 0 , &err, fsize)) && err ) {
 		    cli_dbgmsg("FSG: Support data out of padding area\n");
5eb34fac
 		    break;
 		}
 
f628a181
 		lseek(desc, gp, SEEK_SET);
57866af1
 		gp = exe_sections[i + 1].raw - gp;
f628a181
 
3c91998b
 		if(ctx->limits && ctx->limits->maxfilesize && (unsigned int) gp > ctx->limits->maxfilesize) {
 		    cli_dbgmsg("FSG: Buffer size exceeded (size: %d, max: %lu)\n", gp, ctx->limits->maxfilesize);
5eb34fac
 		    free(section_hdr);
57866af1
 		    free(exe_sections);
ec99a10f
 		    if(BLOCKMAX) {
3c91998b
 			*ctx->virname = "PE.FSG.ExceededFileSize";
ec99a10f
 			return CL_VIRUS;
 		    } else {
 			return CL_CLEAN;
 		    }
5eb34fac
 		}
 
 		if((support = (char *) cli_malloc(gp)) == NULL) {
 		    free(section_hdr);
57866af1
 		    free(exe_sections);
5eb34fac
 		    return CL_EMEM;
 		}
 
57866af1
 		if((int)cli_readn(desc, support, gp) != (int)gp) {
5eb34fac
 		    cli_dbgmsg("Can't read %d bytes from padding area\n", gp); 
 		    free(section_hdr);
57866af1
 		    free(exe_sections);
5eb34fac
 		    free(support);
 		    return CL_EIO;
 		}
 
57866af1
 		/* newebx = cli_readint32(support) - EC32(optional_hdr32.ImageBase);  Unused */
667a4b35
 		newedi = cli_readint32(support + 4) - EC32(optional_hdr32.ImageBase); /* 1st dest */
 		newesi = cli_readint32(support + 8) - EC32(optional_hdr32.ImageBase); /* Source */
5eb34fac
 
57866af1
 		if(newesi < exe_sections[i + 1].rva || newesi - exe_sections[i + 1].rva >= exe_sections[i + 1].rsz) {
5eb34fac
 		    cli_dbgmsg("FSG: Source buffer out of section bounds\n");
 		    free(support);
 		    break;
 		}
 
57866af1
 		if(newedi != exe_sections[i].rva) {
 		    cli_dbgmsg("FSG: Bad destination (is %x should be %x)\n", newedi, exe_sections[i].rva);
5eb34fac
 		    free(support);
 		    break;
 		}
 
 		/* Counting original sections */
 		for(t = 12; t < gp - 4; t += 4) {
 			uint32_t rva = cli_readint32(support+t);
 
 		    if(!rva)
 			break;
 
667a4b35
 		    rva -= EC32(optional_hdr32.ImageBase)+1;
5eb34fac
 		    sectcnt++;
 
 		    if(rva % 0x1000)
 			/* FIXME: really need to bother? */
 			cli_dbgmsg("FSG: Original section %d is misaligned\n", sectcnt);
 
57866af1
 		    if(rva < exe_sections[i].rva || rva - exe_sections[i].rva >= exe_sections[i].vsz) {
5eb34fac
 			cli_dbgmsg("FSG: Original section %d is out of bounds\n", sectcnt);
 			break;
 		    }
 		}
 
b872e15d
 		if(t >= gp - 4 || cli_readint32(support + t)) {
5eb34fac
 		    free(support);
 		    break;
 		}
 
57866af1
 		if((sections = (struct cli_exe_section *) cli_malloc((sectcnt + 1) * sizeof(struct cli_exe_section))) == NULL) {
5eb34fac
 		    free(section_hdr);
57866af1
 		    free(exe_sections);
5eb34fac
 		    free(support);
 		    return CL_EMEM;
 		}
 
 		sections[0].rva = newedi;
57866af1
 		for(t = 1; t <= (uint32_t)sectcnt; t++)
 		    sections[t].rva = cli_readint32(support + 8 + t * 4) - 1 - EC32(optional_hdr32.ImageBase);
5eb34fac
 
 		free(support);
 
 		if((src = (char *) cli_malloc(ssize)) == NULL) {
 		    free(section_hdr);
57866af1
 		    free(exe_sections);
5eb34fac
 		    free(sections);
 		    return CL_EMEM;
 		}
 
57866af1
 		lseek(desc, exe_sections[i + 1].raw, SEEK_SET);
77fcd089
 		if((unsigned int) cli_readn(desc, src, ssize) != ssize) {
5eb34fac
 		    cli_dbgmsg("Can't read raw data of section %d\n", i);
 		    free(section_hdr);
57866af1
 		    free(exe_sections);
5eb34fac
 		    free(sections);
 		    free(src);
 		    return CL_EIO;
 		}
 
 		if((dest = (char *) cli_calloc(dsize, sizeof(char))) == NULL) {
 		    free(section_hdr);
57866af1
 		    free(exe_sections);
5eb34fac
 		    free(src);
 		    free(sections);
 		    return CL_EMEM;
 		}
 
57866af1
 		oldep = vep + 161 + 6 + cli_readint32(buff+163);
5eb34fac
 		cli_dbgmsg("FSG: found old EP @%x\n", oldep);
 
b6f3826f
 		if(!(tempfile = cli_gentemp(NULL))) {
 		    free(section_hdr);
57866af1
 		    free(exe_sections);
b6f3826f
 		    free(src);
 		    free(dest);
 		    free(sections);
e0264472
 		    return CL_EMEM;
b6f3826f
 		}
e0264472
 
c1fdde8a
 		if((ndesc = open(tempfile, O_RDWR|O_CREAT|O_TRUNC|O_BINARY, S_IRWXU)) < 0) {
5eb34fac
 		    cli_dbgmsg("FSG: Can't create file %s\n", tempfile);
 		    free(tempfile);
 		    free(section_hdr);
57866af1
 		    free(exe_sections);
5eb34fac
 		    free(src);
 		    free(dest);
 		    free(sections);
 		    return CL_EIO;
 		}
 
57866af1
 		switch(unfsg_133(src + newesi - exe_sections[i + 1].rva, dest, ssize + exe_sections[i + 1].rva - newesi, dsize, sections, sectcnt, EC32(optional_hdr32.ImageBase), oldep, ndesc)) {
5eb34fac
 		    case 1: /* Everything OK */
 			cli_dbgmsg("FSG: Unpacked and rebuilt executable saved in %s\n", tempfile);
 			free(src);
 			free(dest);
 			free(sections);
 			fsync(ndesc);
 			lseek(ndesc, 0, SEEK_SET);
 
4a24fe30
 			cli_dbgmsg("***** Scanning rebuilt PE file *****\n");
3c91998b
 			if(cli_magic_scandesc(ndesc, ctx) == CL_VIRUS) {
5eb34fac
 			    free(section_hdr);
57866af1
 			    free(exe_sections);
5eb34fac
 			    close(ndesc);
 			    if(!cli_leavetemps_flag)
 				unlink(tempfile);
 			    free(tempfile);
 			    return CL_VIRUS;
 			}
 
 			close(ndesc);
 			if(!cli_leavetemps_flag)
 			    unlink(tempfile);
 			free(tempfile);
 			free(section_hdr);
57866af1
 			free(exe_sections);
5eb34fac
 			return CL_CLEAN;
 
 		    case 0: /* We've got an unpacked buffer, no exe though */
57866af1
 			cli_dbgmsg("FSG: Successfully decompressed\n");
5eb34fac
 			close(ndesc);
 			unlink(tempfile);
 			free(tempfile);
 			free(sections);
 			found = 0;
 			upx_success = 1;
 			break; /* Go and scan the buffer! */
 
 		    default: /* Everything gone wrong */
 			cli_dbgmsg("FSG: Unpacking failed\n");
 			close(ndesc);
8d3aca30
 			unlink(tempfile); /* It's empty anyway */
5eb34fac
 			free(tempfile);
 			free(src);
 			free(dest);
 			free(sections);
 			break;
 		}
 
 		break; /* were done with 1.33 */
 	    }
 	}
 
f628a181
 	/* FIXME: easy 2 hack */
bc93eda0
  	if(found && (DCONF & PE_CONF_FSG) && buff[0] == '\xbb' && cli_readint32(buff + 1) - EC32(optional_hdr32.ImageBase) < min && buff[5] == '\xbf' && buff[10] == '\xbe' && vep >= exe_sections[i + 1].rva && vep - exe_sections[i + 1].rva > exe_sections[i + 1].rva - 0xe0 ) {
f628a181
 
 	    /* FSG support - v. 1.31 */
 
57866af1
 	    ssize = exe_sections[i + 1].rsz;
 	    dsize = exe_sections[i].vsz;
f628a181
 
 	    while(found) {
57866af1
 		    int sectcnt = 0;
 		    uint32_t t;
 		    uint32_t gp = cli_rawaddr(cli_readint32(buff+1) - EC32(optional_hdr32.ImageBase), NULL, 0 , &err, fsize);
f628a181
 		    char *support;
667a4b35
 		    uint32_t newesi = cli_readint32(buff+11) - EC32(optional_hdr32.ImageBase);
 		    uint32_t newedi = cli_readint32(buff+6) - EC32(optional_hdr32.ImageBase);
57866af1
 		    uint32_t oldep = vep - exe_sections[i + 1].rva;
 		    struct cli_exe_section *sections;
f628a181
 
57866af1
 		if(err) {
 		    cli_dbgmsg("FSG: Support data out of padding area\n");
 		    break;
f628a181
 		}
 
57866af1
 		if(newesi < exe_sections[i + 1].rva || newesi - exe_sections[i + 1].rva >= exe_sections[i + 1].raw) {
f628a181
 		    cli_dbgmsg("FSG: Source buffer out of section bounds\n");
 		    break;
 		}
 
57866af1
 		if(newedi != exe_sections[i].rva) {
 		    cli_dbgmsg("FSG: Bad destination (is %x should be %x)\n", newedi, exe_sections[i].rva);
f628a181
 		    break;
 		}
 
3c91998b
 		if(ctx->limits && ctx->limits->maxfilesize && (ssize > ctx->limits->maxfilesize || dsize > ctx->limits->maxfilesize)) {
e2ff1490
 		    cli_dbgmsg("FSG: Sizes exceeded (ssize: %u, dsize: %u, max: %lu)\n", ssize, dsize, ctx->limits->maxfilesize);
f628a181
 		    free(section_hdr);
57866af1
 		    free(exe_sections);
ec99a10f
 		    if(BLOCKMAX) {
3c91998b
 			*ctx->virname = "PE.FSG.ExceededFileSize";
ec99a10f
 			return CL_VIRUS;
 		    } else {
 			return CL_CLEAN;
 		    }
f628a181
 		}
 
 		if(ssize <= 0x19 || dsize <= ssize) {
 		    cli_dbgmsg("FSG: Size mismatch (ssize: %d, dsize: %d)\n", ssize, dsize);
 		    free(section_hdr);
57866af1
 		    free(exe_sections);
f628a181
 		    return CL_CLEAN;
 		}
 
 		lseek(desc, gp, SEEK_SET);
57866af1
 		gp = exe_sections[i + 1].raw - gp;
f628a181
 
57866af1
 		if(ctx->limits && ctx->limits->maxfilesize && gp > ctx->limits->maxfilesize) {
3c91998b
 		    cli_dbgmsg("FSG: Buffer size exceeded (size: %d, max: %lu)\n", gp, ctx->limits->maxfilesize);
f628a181
 		    free(section_hdr);
57866af1
 		    free(exe_sections);
ec99a10f
 		    if(BLOCKMAX) {
3c91998b
 			*ctx->virname = "PE.FSG.ExceededFileSize";
ec99a10f
 			return CL_VIRUS;
 		    } else {
 			return CL_CLEAN;
 		    }
f628a181
 		}
 
 		if((support = (char *) cli_malloc(gp)) == NULL) {
 		    free(section_hdr);
57866af1
 		    free(exe_sections);
f628a181
 		    return CL_EMEM;
 		}
 
57866af1
 		if(cli_readn(desc, support, gp) != (int)gp) {
f628a181
 		    cli_dbgmsg("Can't read %d bytes from padding area\n", gp); 
 		    free(section_hdr);
57866af1
 		    free(exe_sections);
f628a181
 		    free(support);
 		    return CL_EIO;
 		}
 
 		/* Counting original sections */
 		for(t = 0; t < gp - 2; t += 2) {
57866af1
 		  uint32_t rva = support[t]|(support[t+1]<<8);
f628a181
 		  
 		  if (rva == 2 || rva == 1)
 		    break;
 
667a4b35
 		  rva = ((rva-2)<<12) - EC32(optional_hdr32.ImageBase);
f628a181
 		  sectcnt++;
 
57866af1
 		  if(rva < exe_sections[i].rva || rva - exe_sections[i].rva >= exe_sections[i].vsz) {
f628a181
 		    cli_dbgmsg("FSG: Original section %d is out of bounds\n", sectcnt);
 		    break;
 		  }
 		}
 
41fd7c2f
 		if(t >= gp-10 || cli_readint32(support + t + 6) != 2) {
f628a181
 		    free(support);
 		    break;
 		}
 
57866af1
 		if((sections = (struct cli_exe_section *) cli_malloc((sectcnt + 1) * sizeof(struct cli_exe_section))) == NULL) {
f628a181
 		    free(section_hdr);
57866af1
 		    free(exe_sections);
f628a181
 		    free(support);
 		    return CL_EMEM;
 		}
 
 		sections[0].rva = newedi;
57866af1
 		for(t = 0; t <= (uint32_t)sectcnt - 1; t++) {
 		  sections[t+1].rva = (((support[t*2]|(support[t*2+1]<<8))-2)<<12)-EC32(optional_hdr32.ImageBase);
f628a181
 		}
 
 		free(support);
 
 		if((src = (char *) cli_malloc(ssize)) == NULL) {
 		    free(section_hdr);
57866af1
 		    free(exe_sections);
f628a181
 		    free(sections);
 		    return CL_EMEM;
 		}
 
57866af1
 		lseek(desc, exe_sections[i + 1].raw, SEEK_SET);
77fcd089
 		if((unsigned int) cli_readn(desc, src, ssize) != ssize) {
57866af1
 		    cli_dbgmsg("FSG: Can't read raw data of section %d\n", i);
f628a181
 		    free(section_hdr);
57866af1
 		    free(exe_sections);
f628a181
 		    free(sections);
 		    free(src);
 		    return CL_EIO;
 		}
 
 		if((dest = (char *) cli_calloc(dsize, sizeof(char))) == NULL) {
 		    free(section_hdr);
57866af1
 		    free(exe_sections);
f628a181
 		    free(src);
 		    free(sections);
 		    return CL_EMEM;
 		}
 
 		/* Better not increasing buff size any further, let's go the hard way */
a4843a8d
 		gp = 0xda + 6*(buff[16]=='\xe8');
57866af1
 		oldep = vep + gp + 6 + cli_readint32(src+gp+2+oldep);
f628a181
 		cli_dbgmsg("FSG: found old EP @%x\n", oldep);
 
b6f3826f
 		if(!(tempfile = cli_gentemp(NULL))) {
 		    free(section_hdr);
57866af1
 		    free(exe_sections);
b6f3826f
 		    free(src);
 		    free(dest);
 		    free(sections);
e0264472
 		    return CL_EMEM;
b6f3826f
 		}
e0264472
 
c1fdde8a
 		if((ndesc = open(tempfile, O_RDWR|O_CREAT|O_TRUNC|O_BINARY, S_IRWXU)) < 0) {
f628a181
 		    cli_dbgmsg("FSG: Can't create file %s\n", tempfile);
 		    free(tempfile);
 		    free(section_hdr);
57866af1
 		    free(exe_sections);
f628a181
 		    free(src);
 		    free(dest);
 		    free(sections);
 		    return CL_EIO;
 		}
 
667a4b35
 		switch(unfsg_133(src + newesi - EC32(section_hdr[i + 1].VirtualAddress), dest, ssize + EC32(section_hdr[i + 1].VirtualAddress) - newesi, dsize, sections, sectcnt, EC32(optional_hdr32.ImageBase), oldep, ndesc)) {
f628a181
 		    case 1: /* Everything OK */
 			cli_dbgmsg("FSG: Unpacked and rebuilt executable saved in %s\n", tempfile);
 			free(src);
 			free(dest);
 			free(sections);
 			fsync(ndesc);
 			lseek(ndesc, 0, SEEK_SET);
 
4a24fe30
 			cli_dbgmsg("***** Scanning rebuilt PE file *****\n");
3c91998b
 			if(cli_magic_scandesc(ndesc, ctx) == CL_VIRUS) {
f628a181
 			    free(section_hdr);
57866af1
 			    free(exe_sections);
f628a181
 			    close(ndesc);
 			    if(!cli_leavetemps_flag)
 				unlink(tempfile);
 			    free(tempfile);
 			    return CL_VIRUS;
 			}
 
 			close(ndesc);
 			if(!cli_leavetemps_flag)
 			    unlink(tempfile);
 			free(tempfile);
 			free(section_hdr);
57866af1
 			free(exe_sections);
f628a181
 			return CL_CLEAN;
 
 		    case 0: /* We've got an unpacked buffer, no exe though */
 			cli_dbgmsg("FSG: FSG: Successfully decompressed\n");
 			close(ndesc);
 			unlink(tempfile);
 			free(tempfile);
 			free(sections);
 			found = 0;
 			upx_success = 1;
 			break; /* Go and scan the buffer! */
 
 		    default: /* Everything gone wrong */
 			cli_dbgmsg("FSG: Unpacking failed\n");
 			close(ndesc);
8d3aca30
 			unlink(tempfile); /* It's empty anyway */
f628a181
 			free(tempfile);
 			free(src);
 			free(dest);
 			free(sections);
 			break;
 		}
 
 		break; /* were done with 1.31 */
 	    }
 	}
 
 
bc93eda0
 	if(found && (DCONF & PE_CONF_UPX)) {
5ae8bdd5
 
5f1a932b
 	    /* UPX support */
5ae8bdd5
 
8d3aca30
 	    strncpy(sname, (char *) section_hdr[i].Name, 8);
5f1a932b
 	    sname[8] = 0;
 	    cli_dbgmsg("UPX: Section %d name: %s\n", i, sname);
8d3aca30
 	    strncpy(sname, (char *) section_hdr[i + 1].Name, 8);
5f1a932b
 	    sname[8] = 0;
 	    cli_dbgmsg("UPX: Section %d name: %s\n", i + 1, sname);
 
8d3aca30
 	    if(strncmp((char *) section_hdr[i].Name, "UPX0", 4) || strncmp((char *) section_hdr[i + 1].Name, "UPX1", 4))
5f1a932b
 		cli_dbgmsg("UPX: Possibly hacked UPX section headers\n");
 
 	    /* we assume (i + 1) is UPX1 */
57866af1
 	    ssize = exe_sections[i + 1].rsz;
 	    dsize = exe_sections[i].vsz + exe_sections[i + 1].vsz;
5f1a932b
 
3c91998b
 	    if(ctx->limits && ctx->limits->maxfilesize && (ssize > ctx->limits->maxfilesize || dsize > ctx->limits->maxfilesize)) {
e2ff1490
 		cli_dbgmsg("UPX: Sizes exceeded (ssize: %u, dsize: %u, max: %lu)\n", ssize, dsize , ctx->limits->maxfilesize);
5f1a932b
 		free(section_hdr);
57866af1
 		free(exe_sections);
ec99a10f
 		if(BLOCKMAX) {
3c91998b
 		    *ctx->virname = "PE.UPX.ExceededFileSize";
ec99a10f
 		    return CL_VIRUS;
 		} else {
 		    return CL_CLEAN;
 		}
342e27a5
 	    }
5ae8bdd5
 
5f1a932b
 	    if(ssize <= 0x19 || dsize <= ssize) { /* FIXME: What are reasonable values? */
 		cli_dbgmsg("UPX: Size mismatch (ssize: %d, dsize: %d)\n", ssize, dsize);
 		free(section_hdr);
57866af1
 		free(exe_sections);
5f1a932b
 		return CL_CLEAN;
 	    }
342e27a5
 
5f1a932b
 	    /* FIXME: use file operations in case of big files */
 	    if((src = (char *) cli_malloc(ssize)) == NULL) {
 		free(section_hdr);
57866af1
 		free(exe_sections);
5f1a932b
 		return CL_EMEM;
342e27a5
 	    }
 
e2ff1490
 	    if(dsize > CLI_MAX_ALLOCATION) {
 		cli_errmsg("UPX: Too big value of dsize\n");
 		free(section_hdr);
57866af1
 		free(exe_sections);
e2ff1490
 		free(src);
 		return CL_EMEM;
 	    }
 
57866af1
 	    if((dest = (char *) cli_calloc(dsize + 8192, sizeof(char))) == NULL) {
5f1a932b
 		free(section_hdr);
57866af1
 		free(exe_sections);
5f1a932b
 		free(src);
 		return CL_EMEM;
342e27a5
 	    }
 
57866af1
 	    lseek(desc, exe_sections[i + 1].raw, SEEK_SET);
77fcd089
 	    if((unsigned int) cli_readn(desc, src, ssize) != ssize) {
57866af1
 		cli_dbgmsg("UPX: Can't read raw data of section %d\n", i+1);
5f1a932b
 		free(section_hdr);
57866af1
 		free(exe_sections);
5f1a932b
 		free(src);
 		free(dest);
 		return CL_EIO;
 	    }
 
 	    /* try to detect UPX code */
 
 	    if(lseek(desc, ep, SEEK_SET) == -1) {
57866af1
 		cli_dbgmsg("UPX: lseek() failed\n");
5f1a932b
 		free(section_hdr);
57866af1
 		free(exe_sections);
5f1a932b
 		free(src);
 		free(dest);
 		return CL_EIO;
 	    }
 
77fcd089
 	    if(cli_readn(desc, buff, 126) != 126) { /* i.e. 0x69 + 13 + 8 */
5f1a932b
 		cli_dbgmsg("UPX: Can't read 126 bytes at 0x%x (%d)\n", ep, ep);
57866af1
 		cli_dbgmsg("UPX: Broken or not UPX compressed file\n");
5f1a932b
 		free(section_hdr);
57866af1
 		free(exe_sections);
5f1a932b
 		free(src);
 		free(dest);
18b405d4
 		return CL_CLEAN;
342e27a5
 	    } else {
5f1a932b
 		if(cli_memstr(UPX_NRV2B, 24, buff + 0x69, 13) || cli_memstr(UPX_NRV2B, 24, buff + 0x69 + 8, 13)) {
 		    cli_dbgmsg("UPX: Looks like a NRV2B decompression routine\n");
 		    upxfn = upx_inflate2b;
 		} else if(cli_memstr(UPX_NRV2D, 24, buff + 0x69, 13) || cli_memstr(UPX_NRV2D, 24, buff + 0x69 + 8, 13)) {
 		    cli_dbgmsg("UPX: Looks like a NRV2D decompression routine\n");
 		    upxfn = upx_inflate2d;
 		} else if(cli_memstr(UPX_NRV2E, 24, buff + 0x69, 13) || cli_memstr(UPX_NRV2E, 24, buff + 0x69 + 8, 13)) {
 		    cli_dbgmsg("UPX: Looks like a NRV2E decompression routine\n");
 		    upxfn = upx_inflate2e;
 		}
 	    }
 
 	    if(upxfn) {
57866af1
 		    int skew = cli_readint32(buff + 2) - EC32(optional_hdr32.ImageBase) - exe_sections[i + 1].rva;
5f1a932b
 
41fd7c2f
 		if(buff[1] != '\xbe' || skew <= 0 || skew > 0xfff) { /* FIXME: legit skews?? */
5f1a932b
 		    skew = 0; 
57866af1
 		    if(upxfn(src, ssize, dest, &dsize, exe_sections[i].rva, exe_sections[i + 1].rva, vep) >= 0)
5f1a932b
 			upx_success = 1;
 
 		} else {
 		    cli_dbgmsg("UPX: UPX1 seems skewed by %d bytes\n", skew);
57866af1
                     if(upxfn(src + skew, ssize - skew, dest, &dsize, exe_sections[i].rva, exe_sections[i + 1].rva, vep-skew) >= 0 || upxfn(src, ssize, dest, &dsize, exe_sections[i].rva, exe_sections[i + 1].rva, vep) >= 0)
5f1a932b
 			upx_success = 1;
 		}
 
 		if(upx_success)
 		    cli_dbgmsg("UPX: Successfully decompressed\n");
 		else
57866af1
 		    cli_dbgmsg("UPX: Preferred decompressor failed\n");
5f1a932b
 	    }
 
 	    if(!upx_success && upxfn != upx_inflate2b) {
57866af1
 		if(upx_inflate2b(src, ssize, dest, &dsize, exe_sections[i].rva, exe_sections[i + 1].rva, vep) == -1 && upx_inflate2b(src + 0x15, ssize - 0x15, dest, &dsize, exe_sections[i].rva, exe_sections[i + 1].rva, vep - 0x15) == -1) {
4a24fe30
 
5f1a932b
 		    cli_dbgmsg("UPX: NRV2B decompressor failed\n");
 		} else {
 		    upx_success = 1;
 		    cli_dbgmsg("UPX: Successfully decompressed with NRV2B\n");
 		}
 	    }
 
 	    if(!upx_success && upxfn != upx_inflate2d) {
57866af1
 		if(upx_inflate2d(src, ssize, dest, &dsize, exe_sections[i].rva, exe_sections[i + 1].rva, vep) == -1 && upx_inflate2d(src + 0x15, ssize - 0x15, dest, &dsize, exe_sections[i].rva, exe_sections[i + 1].rva, vep - 0x15) == -1) {
4a24fe30
 
5f1a932b
 		    cli_dbgmsg("UPX: NRV2D decompressor failed\n");
 		} else {
 		    upx_success = 1;
 		    cli_dbgmsg("UPX: Successfully decompressed with NRV2D\n");
 		}
 	    }
 
 	    if(!upx_success && upxfn != upx_inflate2e) {
57866af1
 		if(upx_inflate2e(src, ssize, dest, &dsize, exe_sections[i].rva, exe_sections[i + 1].rva, vep) == -1 && upx_inflate2e(src + 0x15, ssize - 0x15, dest, &dsize, exe_sections[i].rva, exe_sections[i + 1].rva, vep - 0x15) == -1) {
5f1a932b
 		    cli_dbgmsg("UPX: NRV2E decompressor failed\n");
 		} else {
 		    upx_success = 1;
 		    cli_dbgmsg("UPX: Successfully decompressed with NRV2E\n");
 		}
 	    }
 
 	    if(!upx_success) {
 		cli_dbgmsg("UPX: All decompressors failed\n");
 		free(src);
 		free(dest);
a9082ea2
 	    }
 	}
342e27a5
 
5f1a932b
 	if(upx_success) {
4a24fe30
 	    free(src);
 	    free(section_hdr);
57866af1
 	    free(exe_sections);
342e27a5
 
60cd49c9
 	    if(!(tempfile = cli_gentemp(NULL))) {
 	        free(dest);
e0264472
 		return CL_EMEM;
60cd49c9
 	    }
e0264472
 
c1fdde8a
 	    if((ndesc = open(tempfile, O_RDWR|O_CREAT|O_TRUNC|O_BINARY, S_IRWXU)) < 0) {
4a24fe30
 		cli_dbgmsg("UPX/FSG: Can't create file %s\n", tempfile);
 		free(tempfile);
 		free(dest);
 		return CL_EIO;
 	    }
342e27a5
 
33f89aa5
 	    if((unsigned int) write(ndesc, dest, dsize) != dsize) {
4a24fe30
 		cli_dbgmsg("UPX/FSG: Can't write %d bytes\n", dsize);
 		free(tempfile);
 		free(dest);
342e27a5
 		close(ndesc);
4a24fe30
 		return CL_EIO;
 	    }
 
 	    free(dest);
 	    fsync(ndesc);
 	    lseek(ndesc, 0, SEEK_SET);
 
 	    if(cli_leavetemps_flag)
5f1a932b
 		cli_dbgmsg("UPX/FSG: Decompressed data saved in %s\n", tempfile);
4a24fe30
 
27361ec7
 	    cli_dbgmsg("***** Scanning decompressed file *****\n");
3c91998b
 	    if((ret = cli_magic_scandesc(ndesc, ctx)) == CL_VIRUS) {
4a24fe30
 		close(ndesc);
 		if(!cli_leavetemps_flag)
 		    unlink(tempfile);
342e27a5
 		free(tempfile);
4a24fe30
 		return CL_VIRUS;
342e27a5
 	    }
 
4a24fe30
 	    close(ndesc);
 	    if(!cli_leavetemps_flag)
 		unlink(tempfile);
 	    free(tempfile);
01d06070
 	    return ret;
5f1a932b
 	}
342e27a5
     }
ac75a532
 
85dd8460
     /* Petite */
 
     found = 2;
 
     lseek(desc, ep, SEEK_SET);
6b169692
     memset(buff, 0, sizeof(buff));
     if(cli_readn(desc, buff, 200) == -1) {
 	cli_dbgmsg("cli_readn() failed\n");
20c3d44d
 	free(section_hdr);
57866af1
 	free(exe_sections);
85dd8460
 	return CL_EIO;
20c3d44d
     }
85dd8460
 
667a4b35
     if(buff[0] != '\xb8' || (uint32_t) cli_readint32(buff + 1) != EC32(section_hdr[nsections - 1].VirtualAddress) + EC32(optional_hdr32.ImageBase)) {
 	if(nsections < 2 || buff[0] != '\xb8' || (uint32_t) cli_readint32(buff + 1) != EC32(section_hdr[nsections - 2].VirtualAddress) + EC32(optional_hdr32.ImageBase))
85dd8460
 	    found = 0;
 	else
 	    found = 1;
     }
 
bc93eda0
     if((DCONF & PE_CONF_PETITE) && found) {
85dd8460
 	cli_dbgmsg("Petite: v2.%d compression detected\n", found);
 
 	if(cli_readint32(buff + 0x80) == 0x163c988d) {
 	    cli_dbgmsg("Petite: level zero compression is not supported yet\n");
 	} else {
 	    dsize = max - min;
 
3c91998b
 	    if(ctx->limits && ctx->limits->maxfilesize && dsize > ctx->limits->maxfilesize) {
e2ff1490
 		cli_dbgmsg("Petite: Size exceeded (dsize: %u, max: %lu)\n", dsize, ctx->limits->maxfilesize);
85dd8460
 		free(section_hdr);
57866af1
 		free(exe_sections);
ec99a10f
 		if(BLOCKMAX) {
3c91998b
 		    *ctx->virname = "PE.Petite.ExceededFileSize";
ec99a10f
 		    return CL_VIRUS;
 		} else {
 		    return CL_CLEAN;
 		}
85dd8460
 	    }
 
 	    if((dest = (char *) cli_calloc(dsize, sizeof(char))) == NULL) {
 		cli_dbgmsg("Petite: Can't allocate %d bytes\n", dsize);
 		free(section_hdr);
57866af1
 		free(exe_sections);
85dd8460
 		return CL_EMEM;
 	    }
 
 	    for(i = 0 ; i < nsections; i++) {
01d06070
 		if(section_hdr[i].SizeOfRawData) {
57866af1
 		  uint32_t offset = cli_rawaddr(EC32(section_hdr[i].VirtualAddress), exe_sections, nsections, &err, fsize);
01d06070
 
77fcd089
 		    if(err || lseek(desc, offset, SEEK_SET) == -1 || (unsigned int) cli_readn(desc, dest + EC32(section_hdr[i].VirtualAddress) - min, EC32(section_hdr[i].SizeOfRawData)) != EC32(section_hdr[i].SizeOfRawData)) {
01d06070
 			free(section_hdr);
57866af1
 			free(exe_sections);
01d06070
 			free(dest);
 			return CL_EIO;
 		    }
 		}
85dd8460
 	    }
 
60cd49c9
 	    if(!(tempfile = cli_gentemp(NULL))) {
 	      free(dest);
 	      free(section_hdr);
57866af1
 	      free(exe_sections);
60cd49c9
 	      return CL_EMEM;
 	    }
e0264472
 
c1fdde8a
 	    if((ndesc = open(tempfile, O_RDWR|O_CREAT|O_TRUNC|O_BINARY, S_IRWXU)) < 0) {
85dd8460
 		cli_dbgmsg("Petite: Can't create file %s\n", tempfile);
 		free(tempfile);
 		free(section_hdr);
57866af1
 		free(exe_sections);
85dd8460
 		free(dest);
 		return CL_EIO;
 	    }
 
01d06070
 	    /* aCaB: Fixed to allow petite v2.1 unpacking (last section is a ghost) */
57866af1
 	    if (!petite_inflate2x_1to9(dest, min, max - min, section_hdr,
667a4b35
 		    nsections - (found == 1 ? 1 : 0), EC32(optional_hdr32.ImageBase),
57866af1
 		    vep, ndesc, found, EC32(optional_hdr32.DataDirectory[2].VirtualAddress),
667a4b35
 		    EC32(optional_hdr32.DataDirectory[2].Size))) {
57866af1
 	        cli_dbgmsg("Petite: Unpacked and rebuilt executable saved in %s\n", tempfile);
 		cli_dbgmsg("***** Scanning rebuilt PE file *****\n");
 		free(dest);
 		fsync(ndesc);
 		lseek(ndesc, 0, SEEK_SET);
 		if(cli_magic_scandesc(ndesc, ctx) == CL_VIRUS) {
 		    free(section_hdr);
 		    free(exe_sections);
 		    close(ndesc);
 		    if(!cli_leavetemps_flag) {
 		        unlink(tempfile);
 		    }
85dd8460
 		    free(tempfile);
57866af1
 		    return CL_VIRUS;
85dd8460
 		}
 
57866af1
 	    } else {
 	        cli_dbgmsg("Petite: Unpacking failed\n");
 		free(dest);
 	    }
85dd8460
 	    close(ndesc);
 	    if(!cli_leavetemps_flag) {
57866af1
 	        unlink(tempfile);
85dd8460
 	    }
57866af1
 	    free(tempfile);
85dd8460
 	}
     }
 
c2dfe70e
     /* PESpin 1.1 */
 
bc93eda0
     if((DCONF & PE_CONF_PESPIN) && nsections > 1 &&
57866af1
        vep >= EC32(section_hdr[nsections - 1].VirtualAddress) &&
        vep < EC32(section_hdr[nsections - 1].VirtualAddress) + EC32(section_hdr[nsections - 1].SizeOfRawData) - 0x3217 - 4 &&
c2dfe70e
        memcmp(buff+4, "\xe8\x00\x00\x00\x00\x8b\x1c\x24\x83\xc3", 10) == 0)  {
 
81030038
 	    char *spinned;
 
8865a4d6
 	if(ctx->limits && ctx->limits->maxfilesize && fsize > ctx->limits->maxfilesize) {
 	    cli_dbgmsg("PEspin: Size exceeded (fsize: %u, max: %lu)\n", fsize, ctx->limits->maxfilesize);
             free(section_hdr);
57866af1
 	    free(exe_sections);
8865a4d6
 	    if(BLOCKMAX) {
 		*ctx->virname = "PE.Pespin.ExceededFileSize";
 		return CL_VIRUS;
 	    } else {
 		return CL_CLEAN;
 	    }
 	}
c2dfe70e
 
e0264472
 	if((spinned = (char *) cli_malloc(fsize)) == NULL) {
c2dfe70e
 	    free(section_hdr);
57866af1
 	    free(exe_sections);
c2dfe70e
 	    return CL_EMEM;
 	}
 
 	lseek(desc, 0, SEEK_SET);
77fcd089
 	if((size_t) cli_readn(desc, spinned, fsize) != fsize) {
e0264472
 	    cli_dbgmsg("PESpin: Can't read %d bytes\n", fsize);
c2dfe70e
 	    free(spinned);
 	    free(section_hdr);
57866af1
 	    free(exe_sections);
c2dfe70e
 	    return CL_EIO;
 	}
 
60cd49c9
 	if(!(tempfile = cli_gentemp(NULL))) {
 	  free(spinned);
 	  free(section_hdr);
57866af1
 	  free(exe_sections);
60cd49c9
 	  return CL_EMEM;
 	}
e0264472
 
c1fdde8a
 	if((ndesc = open(tempfile, O_RDWR|O_CREAT|O_TRUNC|O_BINARY, S_IRWXU)) < 0) {
c2dfe70e
 	    cli_dbgmsg("PESpin: Can't create file %s\n", tempfile);
 	    free(tempfile);
 	    free(spinned);
 	    free(section_hdr);
57866af1
 	    free(exe_sections);
c2dfe70e
 	    return CL_EIO;
 	}
 
57866af1
 	switch(unspin(spinned, fsize, section_hdr, nsections - 1, vep, ndesc, ctx)) {
8865a4d6
 	case 0:
c2dfe70e
 	    free(spinned);
8865a4d6
 	    if(cli_leavetemps_flag)
 		cli_dbgmsg("PESpin: Unpacked and rebuilt executable saved in %s\n", tempfile);
 	    else
 		cli_dbgmsg("PESpin: Unpacked and rebuilt executable\n");
c2dfe70e
 	    fsync(ndesc);
 	    lseek(ndesc, 0, SEEK_SET);
3c91998b
 	    if(cli_magic_scandesc(ndesc, ctx) == CL_VIRUS) {
c2dfe70e
 		close(ndesc);
8865a4d6
 		if(!cli_leavetemps_flag)
c2dfe70e
 		    unlink(tempfile);
8865a4d6
 	        free(tempfile);
 		free(section_hdr);
57866af1
 		free(exe_sections);
c2dfe70e
 		return CL_VIRUS;
 	    }
8865a4d6
 	    close(ndesc);
    	    if(!cli_leavetemps_flag)
 		unlink(tempfile);
 	    break;
 	case 1:
c2dfe70e
 	    free(spinned);
8865a4d6
 	    close(ndesc);
 	    unlink(tempfile);
c2dfe70e
 	    cli_dbgmsg("PESpin: Rebuilding failed\n");
8865a4d6
 	    break;
 	case 2:
 	    free(spinned);
 	    close(ndesc);
c2dfe70e
 	    unlink(tempfile);
8865a4d6
 	    cli_dbgmsg("PESpin: Size exceeded\n");
 	    if(BLOCKMAX) {
 		free(tempfile);
 		free(section_hdr);
57866af1
 		free(exe_sections);
8865a4d6
 		*ctx->virname = "PE.Pespin.ExceededFileSize";
 		return CL_VIRUS;
 	    }
c2dfe70e
 	}
8865a4d6
 	free(tempfile);
 	
c2dfe70e
     }
 
822930fc
 
     /* yC 1.3 */
 
bc93eda0
     if((DCONF & PE_CONF_YC) && nsections > 1 &&
822930fc
        EC32(optional_hdr32.AddressOfEntryPoint) == EC32(section_hdr[nsections - 1].VirtualAddress) + 0x60 &&
        memcmp(buff, "\x55\x8B\xEC\x53\x56\x57\x60\xE8\x00\x00\x00\x00\x5D\x81\xED\x6C\x28\x40\x00\xB9\x5D\x34\x40\x00\x81\xE9\xC6\x28\x40\x00\x8B\xD5\x81\xC2\xC6\x28\x40\x00\x8D\x3A\x8B\xF7\x33\xC0\xEB\x04\x90\xEB\x01\xC2\xAC", 51) == 0)  {
 
 	    char *spinned;
 
e0264472
 	if ( fsize >= EC32(section_hdr[nsections - 1].PointerToRawData) + 0xC6 + 0xb97 ) { /* size check on yC sect */
 	  if((spinned = (char *) cli_malloc(fsize)) == NULL) {
822930fc
 	    free(section_hdr);
57866af1
 	    free(exe_sections);
822930fc
 	    return CL_EMEM;
 	  }
 
 	  lseek(desc, 0, SEEK_SET);
77fcd089
 	  if((size_t) cli_readn(desc, spinned, fsize) != fsize) {
e0264472
 	    cli_dbgmsg("yC: Can't read %d bytes\n", fsize);
822930fc
 	    free(spinned);
 	    free(section_hdr);
57866af1
 	    free(exe_sections);
822930fc
 	    return CL_EIO;
 	  }
e0264472
 
60cd49c9
 	  if(!(tempfile = cli_gentemp(NULL))) {
 	    free(spinned);
 	    free(section_hdr);
57866af1
 	    free(exe_sections);
60cd49c9
 	    return CL_EMEM;
 	  }
e0264472
 
c1fdde8a
 	  if((ndesc = open(tempfile, O_RDWR|O_CREAT|O_TRUNC|O_BINARY, S_IRWXU)) < 0) {
822930fc
 	    cli_dbgmsg("yC: Can't create file %s\n", tempfile);
 	    free(tempfile);
 	    free(spinned);
 	    free(section_hdr);
57866af1
 	    free(exe_sections);
822930fc
 	    return CL_EIO;
 	  }
e0264472
 
 	  if(!yc_decrypt(spinned, fsize, section_hdr, nsections-1, e_lfanew, ndesc)) {
822930fc
 	    free(spinned);
 	    cli_dbgmsg("yC: Unpacked and rebuilt executable saved in %s\n", tempfile);
 	    fsync(ndesc);
 	    lseek(ndesc, 0, SEEK_SET);
 	    
3c91998b
 	    if(cli_magic_scandesc(ndesc, ctx) == CL_VIRUS) {
822930fc
 	      free(section_hdr);
57866af1
 	      free(exe_sections);
822930fc
 	      close(ndesc);
 	      if(!cli_leavetemps_flag) {
 		unlink(tempfile);
 		free(tempfile);
 	      } else {
 		free(tempfile);
 	      }
 	      return CL_VIRUS;
 	    }
 	    
 	  } else {
 	    free(spinned);
 	    cli_dbgmsg("yC: Rebuilding failed\n");
 	  }
 	  
 	  close(ndesc);
 	  if(!cli_leavetemps_flag) {
 	    unlink(tempfile);
 	    free(tempfile);
 	  } else {
 	    free(tempfile);
 	  }
 
 	}
     }
 
29035bdc
 
60cd49c9
     /* WWPack */
 
bc93eda0
     if((DCONF & PE_CONF_WWPACK) && nsections > 1 &&
57866af1
        exe_sections[nsections-1].raw>0x2b1 &&
        vep == exe_sections[nsections - 1].rva &&
        exe_sections[nsections - 1].rva + exe_sections[nsections - 1].rsz == max &&
60cd49c9
        memcmp(buff, "\x53\x55\x8b\xe8\x33\xdb\xeb", 7) == 0 &&
        memcmp(buff+0x68, "\xe8\x00\x00\x00\x00\x58\x2d\x6d\x00\x00\x00\x50\x60\x33\xc9\x50\x58\x50\x50", 19) == 0)  {
57866af1
       uint32_t headsize=exe_sections[nsections - 1].raw;
60cd49c9
       char *dest, *wwp;
 
57866af1
       for(i = 0 ; i < (unsigned int)nsections-1; i++)
 	if (!err && exe_sections[i].raw<headsize) headsize=exe_sections[i].raw;
60cd49c9
       
57866af1
       dsize = max-min+headsize-exe_sections[nsections - 1].rsz;
60cd49c9
 
       if(ctx->limits && ctx->limits->maxfilesize && dsize > ctx->limits->maxfilesize) {
 	cli_dbgmsg("WWPack: Size exceeded (dsize: %u, max: %lu)\n", dsize, ctx->limits->maxfilesize);
 	free(section_hdr);
57866af1
 	free(exe_sections);
60cd49c9
 	if(BLOCKMAX) {
 	  *ctx->virname = "PE.WWPack.ExceededFileSize";
 	  return CL_VIRUS;
 	} else {
 	  return CL_CLEAN;
 	}
       }
 
       if((dest = (char *) cli_calloc(dsize, sizeof(char))) == NULL) {
 	cli_dbgmsg("WWPack: Can't allocate %d bytes\n", dsize);
 	free(section_hdr);
57866af1
 	free(exe_sections);
60cd49c9
 	return CL_EMEM;
       }
 
       lseek(desc, 0, SEEK_SET);
77fcd089
       if((size_t) cli_readn(desc, dest, headsize) != headsize) {
60cd49c9
 	cli_dbgmsg("WWPack: Can't read %d bytes from headers\n", headsize);
 	free(dest);
 	free(section_hdr);
57866af1
 	free(exe_sections);
60cd49c9
 	return CL_EIO;
       }
 
29035bdc
       for(i = 0 ; i < (unsigned int)nsections-1; i++) {
57866af1
 	if(exe_sections[i].rsz) {
 	  uint32_t offset = exe_sections[i].raw;
60cd49c9
 	  
57866af1
 	  if(err || lseek(desc, offset, SEEK_SET) == -1 || (unsigned int) cli_readn(desc, dest + headsize + exe_sections[i].rva - min, exe_sections[i].rsz) != exe_sections[i].rsz) {
60cd49c9
 	    free(dest);
 	    free(section_hdr);
57866af1
 	    free(exe_sections);
60cd49c9
 	    return CL_EIO;
 	  }
 	}
       }
 
57866af1
       if((wwp = (char *) cli_calloc(exe_sections[nsections - 1].rsz, sizeof(char))) == NULL) {
 	cli_dbgmsg("WWPack: Can't allocate %d bytes\n", exe_sections[nsections - 1].rsz);
60cd49c9
 	free(dest);
 	free(section_hdr);
57866af1
 	free(exe_sections);
60cd49c9
 	return CL_EMEM;
       }
 
57866af1
       lseek(desc, exe_sections[nsections - 1].raw, SEEK_SET);
       if((size_t) cli_readn(desc, wwp, exe_sections[nsections - 1].rsz) != exe_sections[nsections - 1].rsz) {
 	cli_dbgmsg("WWPack: Can't read %d bytes from wwpack sect\n", exe_sections[nsections - 1].rsz);
60cd49c9
 	free(dest);
 	free(wwp);
 	free(section_hdr);
57866af1
 	free(exe_sections);
60cd49c9
 	return CL_EIO;
       }
 
57866af1
       if (!wwunpack(dest, dsize, headsize, min, exe_sections[nsections-1].rva, e_lfanew, wwp, exe_sections[nsections - 1].rsz, nsections-1)) {
60cd49c9
 	
 	free(wwp);
 
b6f3826f
 	if(!(tempfile = cli_gentemp(NULL))) {
 	  free(dest);
 	  free(section_hdr);
57866af1
 	  free(exe_sections);
60cd49c9
 	  return CL_EMEM;
b6f3826f
 	}
60cd49c9
 
c1fdde8a
 	if((ndesc = open(tempfile, O_RDWR|O_CREAT|O_TRUNC|O_BINARY, S_IRWXU)) < 0) {
60cd49c9
 	  cli_dbgmsg("WWPack: Can't create file %s\n", tempfile);
 	  free(tempfile);
 	  free(dest);
 	  free(section_hdr);
57866af1
 	  free(exe_sections);
60cd49c9
 	  return CL_EIO;
 	}
 
 	if((unsigned int) write(ndesc, dest, dsize) != dsize) {
3fcb62ca
 	  cli_dbgmsg("WWPack: Can't write %d bytes\n", dsize);
60cd49c9
 	  close(ndesc);
 	  free(tempfile);
 	  free(dest);
 	  free(section_hdr);
57866af1
 	  free(exe_sections);
60cd49c9
 	  return CL_EIO;
 	}
 
 	free(dest);
3fcb62ca
 	if (cli_leavetemps_flag)
 	  cli_dbgmsg("WWPack: Unpacked and rebuilt executable saved in %s\n", tempfile);
 	else
 	  cli_dbgmsg("WWPack: Unpacked and rebuilt executable\n");
 
60cd49c9
 	fsync(ndesc);
 	lseek(ndesc, 0, SEEK_SET);
 
 	if(cli_magic_scandesc(ndesc, ctx) == CL_VIRUS) {
 	  free(section_hdr);
57866af1
 	  free(exe_sections);
60cd49c9
 	  close(ndesc);
 	  if(!cli_leavetemps_flag)
 	    unlink(tempfile);
 	  free(tempfile);
 	  return CL_VIRUS;
 	}
 
 	close(ndesc);
 	if(!cli_leavetemps_flag)
 	  unlink(tempfile);
 	free(tempfile);
       } else {
 	free(wwp);
 	free(dest);
 	cli_dbgmsg("WWPpack: Decompression failed\n");
       }
     }
 
81030038
     /* NsPack */
 
bc93eda0
     while (DCONF & PE_CONF_NSPACK) {
57866af1
       uint32_t eprva = vep;
       uint32_t start_of_stuff, ssize, dsize, rep = ep;
81030038
       unsigned int nowinldr;
57866af1
       char nbuff[24];
       char *src=buff, *dest;
81030038
       FILE *asd;
 
       if (*buff=='\xe9') { /* bitched headers */
57866af1
 	eprva = cli_readint32(buff+1)+vep+5;
 	if (!(rep = cli_rawaddr(eprva, exe_sections, nsections, &err, fsize)) && err) break;
 	if (lseek(desc, rep, SEEK_SET)==-1) break;
 	if (cli_readn(desc, nbuff, 24)!=24) break;
 	src = nbuff;
81030038
       }
 
57866af1
       if (memcmp(src, "\x9c\x60\xe8\x00\x00\x00\x00\x5d\xb8\x07\x00\x00\x00", 13)) break;
81030038
 
57866af1
       nowinldr = 0x54-cli_readint32(src+17);
81030038
       cli_dbgmsg("NsPack: Found *start_of_stuff @delta-%x\n", nowinldr);
 
57866af1
       if (lseek(desc, rep-nowinldr, SEEK_SET)==-1) break;
       if (cli_readn(desc, nbuff, 4)!=4) break;
       start_of_stuff=rep+cli_readint32(nbuff);
81030038
       if (lseek(desc, start_of_stuff, SEEK_SET)==-1) break;
57866af1
       if (cli_readn(desc, nbuff, 20)!=20) break;
       src = nbuff;
       if (!cli_readint32(nbuff)) {
81030038
 	start_of_stuff+=4; /* FIXME: more to do */
 	src+=4;
       }
 
       ssize = cli_readint32(src+5)|0xff;
       dsize = cli_readint32(src+9);
 
       if(ctx->limits && ctx->limits->maxfilesize && (ssize > ctx->limits->maxfilesize || dsize > ctx->limits->maxfilesize)) {
 	cli_dbgmsg("NsPack: Size exceeded\n");
 	free(section_hdr);
57866af1
 	free(exe_sections);
81030038
 	if(BLOCKMAX) {
 	  *ctx->virname = "PE.NsPack.ExceededFileSize";
 	  return CL_VIRUS;
 	} else {
 	  return CL_CLEAN;
 	}
       }
 
57866af1
       if ( !ssize || !dsize || dsize != exe_sections[0].vsz) break;
81030038
       if (lseek(desc, start_of_stuff, SEEK_SET)==-1) break;
       if (!(dest=cli_malloc(dsize))) break;
       /* memset(dest, 0xfc, dsize); */
 
       if (!(src=cli_malloc(ssize))) {
 	free(dest);
 	break;
       }
       /* memset(src, 0x00, ssize); */
       cli_readn(desc, src, ssize);
 
       eprva+=0x27a;
57866af1
       if (!(rep = cli_rawaddr(eprva, exe_sections, nsections, &err, fsize)) && err) break;
       if (lseek(desc, rep, SEEK_SET)==-1) break;
       if (cli_readn(desc, nbuff, 5)!=5) break;
       eprva=eprva+5+cli_readint32(nbuff+1);
81030038
       cli_dbgmsg("NsPack: OEP = %08x\n", eprva);
 
       if(!(tempfile = cli_gentemp(NULL))) {
 	free(src);
 	free(dest);
 	free(section_hdr);
57866af1
 	free(exe_sections);
81030038
 	return CL_EMEM;
       }
 
       if((ndesc = open(tempfile, O_RDWR|O_CREAT|O_TRUNC|O_BINARY, S_IRWXU)) < 0) {
 	cli_dbgmsg("NsPack: Can't create file %s\n", tempfile);
 	free(tempfile);
 	free(src);
 	free(dest);
 	free(section_hdr);
57866af1
 	free(exe_sections);
81030038
 	return CL_EIO;
       }
 
57866af1
       if (!unspack(src, dest, ctx, exe_sections[0].rva, EC32(optional_hdr32.ImageBase), eprva, ndesc)) {
81030038
 	free(src);
 	free(dest);
 	if (cli_leavetemps_flag)
 	  cli_dbgmsg("NsPack: Unpacked and rebuilt executable saved in %s\n", tempfile);
 	else
 	  cli_dbgmsg("NsPack: Unpacked and rebuilt executable\n");
 	fsync(ndesc);
 	lseek(ndesc, 0, SEEK_SET);
 
 	if(cli_magic_scandesc(ndesc, ctx) == CL_VIRUS) {
 	  free(section_hdr);
57866af1
 	  free(exe_sections);
81030038
 	  close(ndesc);
 	  if(!cli_leavetemps_flag) unlink(tempfile);
 	  free(tempfile);
 	  return CL_VIRUS;
 	}
       } else {
 	free(src);
 	free(dest);
 	cli_dbgmsg("NsPack: Unpacking failed\n");
       }
       close(ndesc);
       if(!cli_leavetemps_flag) unlink(tempfile);
       free(tempfile);
       break;
     }
60cd49c9
 
6307ca15
     /* to be continued ... */
 
ac75a532
     free(section_hdr);
57866af1
     free(exe_sections);
342e27a5
     return CL_CLEAN;
6307ca15
 }
cdbf8c8e
 
01302683
 int cli_peheader(int desc, struct cli_exe_info *peinfo)
cdbf8c8e
 {
 	uint16_t e_magic; /* DOS signature ("MZ") */
 	uint32_t e_lfanew; /* address of new exe header */
57866af1
 	/* Obsolete - see below
 	  uint32_t min = 0, max = 0;
 	*/
cdbf8c8e
 	struct pe_image_file_hdr file_hdr;
57866af1
 	union {
 	    struct pe_image_optional_hdr64 opt64;
 	    struct pe_image_optional_hdr32 opt32;
 	} pe_opt;
cdbf8c8e
 	struct pe_image_section_hdr *section_hdr;
 	struct stat sb;
 	int i;
667a4b35
 	unsigned int err, pe_plus = 0;
57866af1
 	uint32_t valign, falign;
 	size_t fsize;
cdbf8c8e
 
     cli_dbgmsg("in cli_peheader\n");
 
57866af1
     if(fstat(desc, &sb) == -1) {
 	cli_dbgmsg("fstat failed\n");
 	return -1;
     }
 
     fsize = sb.st_size;
 
77fcd089
     if(cli_readn(desc, &e_magic, sizeof(e_magic)) != sizeof(e_magic)) {
cdbf8c8e
 	cli_dbgmsg("Can't read DOS signature\n");
 	return -1;
     }
 
     if(EC16(e_magic) != IMAGE_DOS_SIGNATURE && EC16(e_magic) != IMAGE_DOS_SIGNATURE_OLD) {
 	cli_dbgmsg("Invalid DOS signature\n");
 	return -1;
     }
 
     lseek(desc, 58, SEEK_CUR); /* skip to the end of the DOS header */
 
77fcd089
     if(cli_readn(desc, &e_lfanew, sizeof(e_lfanew)) != sizeof(e_lfanew)) {
cdbf8c8e
 	cli_dbgmsg("Can't read new header address\n");
 	/* truncated header? */
 	return -1;
     }
 
     e_lfanew = EC32(e_lfanew);
     if(!e_lfanew) {
 	cli_dbgmsg("Not a PE file\n");
 	return -1;
     }
 
     if(lseek(desc, e_lfanew, SEEK_SET) < 0) {
 	/* probably not a PE file */
 	cli_dbgmsg("Can't lseek to e_lfanew\n");
 	return -1;
     }
 
77fcd089
     if(cli_readn(desc, &file_hdr, sizeof(struct pe_image_file_hdr)) != sizeof(struct pe_image_file_hdr)) {
cdbf8c8e
 	/* bad information in e_lfanew - probably not a PE file */
 	cli_dbgmsg("Can't read file header\n");
 	return -1;
     }
 
     if(EC32(file_hdr.Magic) != IMAGE_NT_SIGNATURE) {
 	cli_dbgmsg("Invalid PE signature (probably NE file)\n");
 	return -1;
     }
 
667a4b35
     peinfo->nsections = EC16(file_hdr.NumberOfSections);
 
57866af1
     if (EC16(file_hdr.SizeOfOptionalHeader) < sizeof(struct pe_image_optional_hdr32)) {
         cli_dbgmsg("SizeOfOptionalHeader too small\n");
 	return -1;
     }
 
     if(cli_readn(desc, &optional_hdr32, sizeof(struct pe_image_optional_hdr32)) != sizeof(struct pe_image_optional_hdr32)) {
         cli_dbgmsg("Can't read optional file header\n");
 	return -1;
     }
 
     if(EC32(optional_hdr64.Magic)==PE32P_SIGNATURE) {
         if(EC16(file_hdr.SizeOfOptionalHeader)!=sizeof(struct pe_image_optional_hdr64)) {
 	    cli_dbgmsg("Incorrect SizeOfOptionalHeader for PE32+\n");
667a4b35
 	    return -1;
 	}
57866af1
 	pe_plus = 1;
cdbf8c8e
     }
 
667a4b35
     if(!pe_plus) { /* PE */
c3fb88cc
 	cli_dbgmsg("File format: PE\n");
57866af1
 	if (EC16(file_hdr.SizeOfOptionalHeader)!=sizeof(struct pe_image_optional_hdr32)) {
 	    /* Seek to the end of the long header */
 	    lseek(desc, (EC16(file_hdr.SizeOfOptionalHeader)-sizeof(struct pe_image_optional_hdr32)), SEEK_CUR);
 	}
667a4b35
 
57866af1
     } else { /* PE+ */
         if(cli_readn(desc, &optional_hdr32 + 1, sizeof(struct pe_image_optional_hdr64) - sizeof(struct pe_image_optional_hdr32)) != sizeof(struct pe_image_optional_hdr64) - sizeof(struct pe_image_optional_hdr32)) {
 	    cli_dbgmsg("Can't read optional file header\n");
667a4b35
 	    return -1;
 	}
57866af1
 
 	cli_dbgmsg("File format: PE32+\n");
cdbf8c8e
     }
 
57866af1
     valign = (pe_plus)?EC32(optional_hdr64.SectionAlignment):EC32(optional_hdr32.SectionAlignment);
     falign = (pe_plus)?EC32(optional_hdr64.FileAlignment):EC32(optional_hdr32.FileAlignment);
 
01302683
     peinfo->section = (struct cli_exe_section *) cli_calloc(peinfo->nsections, sizeof(struct cli_exe_section));
cdbf8c8e
 
7ec67e94
     if(!peinfo->section) {
cdbf8c8e
 	cli_dbgmsg("Can't allocate memory for section headers\n");
 	return -1;
     }
 
7ec67e94
     section_hdr = (struct pe_image_section_hdr *) cli_calloc(peinfo->nsections, sizeof(struct pe_image_section_hdr));
cdbf8c8e
 
     if(!section_hdr) {
 	cli_dbgmsg("Can't allocate memory for section headers\n");
7ec67e94
 	free(peinfo->section);
841161e0
 	peinfo->section = NULL;
cdbf8c8e
 	return -1;
     }
 
7ec67e94
     for(i = 0; i < peinfo->nsections; i++) {
cdbf8c8e
 
77fcd089
 	if(cli_readn(desc, &section_hdr[i], sizeof(struct pe_image_section_hdr)) != sizeof(struct pe_image_section_hdr)) {
cdbf8c8e
 	    cli_dbgmsg("Can't read section header\n");
 	    cli_dbgmsg("Possibly broken PE file\n");
 	    free(section_hdr);
7ec67e94
 	    free(peinfo->section);
841161e0
 	    peinfo->section = NULL;
cdbf8c8e
 	    return -1;
 	}
 
57866af1
 	peinfo->section[i].rva = PEALIGN(EC32(section_hdr[i].VirtualAddress), valign);
 	peinfo->section[i].vsz = PESALIGN(EC32(section_hdr[i].VirtualSize), valign);
 	peinfo->section[i].raw = PEALIGN(EC32(section_hdr[i].PointerToRawData), falign);
 	peinfo->section[i].rsz = PESALIGN(EC32(section_hdr[i].SizeOfRawData), falign);
 	if (peinfo->section[i].rsz && !CLI_ISCONTAINED(0, (uint32_t) fsize, peinfo->section[i].raw, peinfo->section[i].rsz))
 	    peinfo->section[i].rsz = (fsize - peinfo->section[i].raw)*(fsize>peinfo->section[i].raw);
cdbf8c8e
 
57866af1
 	/* cli_rawaddr now handles the whole process space
 	 * TO BE REMOVED
239983bc
 	if(!i) {
57866af1
 	    min = peinfo->section[i].rva;
 	    max = peinfo->section[i].rva + peinfo->section[i].rsz;
239983bc
 	} else {
 	    if(EC32(section_hdr[i].VirtualAddress) < min)
 		min = EC32(section_hdr[i].VirtualAddress);
 
 	    if(EC32(section_hdr[i].VirtualAddress) + EC32(section_hdr[i].SizeOfRawData) > max)
 		max = EC32(section_hdr[i].VirtualAddress) + EC32(section_hdr[i].SizeOfRawData);
 	}
57866af1
 	*/
239983bc
     }
33f89aa5
 
667a4b35
     if(pe_plus)
 	peinfo->ep = EC32(optional_hdr64.AddressOfEntryPoint);
     else
 	peinfo->ep = EC32(optional_hdr32.AddressOfEntryPoint);
 
57866af1
     if(!(peinfo->ep = cli_rawaddr(peinfo->ep, peinfo->section, peinfo->nsections, &err, fsize)) && err) {
 #ifdef ACAB_REGRESSION
 	peinfo->ep = 0x7fffffff;
 #else
 	cli_dbgmsg("Broken PE file\n");
cdbf8c8e
 	free(section_hdr);
7ec67e94
 	free(peinfo->section);
841161e0
 	peinfo->section = NULL;
cdbf8c8e
 	return -1;
57866af1
 #endif /* ACAB_REGRESSION */
cdbf8c8e
     }
 
     free(section_hdr);
     return 0;
 }