2018-12-17 11:47:18 -05:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2015 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
|
|
|
|
* Copyright (C) 2009 Sourcefire, Inc.
|
|
|
|
*
|
2019-05-30 13:29:02 -04:00
|
|
|
* Authors: Tomasz Kojm, aCaB, Mickey Sola
|
2018-12-17 11:47:18 -05:00
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License version 2 as
|
|
|
|
* published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
|
|
|
|
* MA 02110-1301, USA.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#if HAVE_CONFIG_H
|
|
|
|
#include "clamav-config.h"
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(C_SOLARIS)
|
|
|
|
#ifndef __EXTENSIONS__
|
|
|
|
#define __EXTENSIONS__
|
|
|
|
#endif
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* must be first because it may define _XOPEN_SOURCE */
|
|
|
|
#include "shared/fdpassing.h"
|
|
|
|
#include <stdio.h>
|
2019-04-25 16:11:39 -04:00
|
|
|
#include <curl/curl.h>
|
2018-12-17 11:47:18 -05:00
|
|
|
#ifdef HAVE_UNISTD_H
|
|
|
|
#include <unistd.h>
|
|
|
|
#endif
|
|
|
|
#include <string.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <sys/types.h>
|
|
|
|
#ifdef HAVE_SYS_SELECT_H
|
|
|
|
#include <sys/select.h>
|
|
|
|
#endif
|
|
|
|
#ifndef _WIN32
|
|
|
|
#include <arpa/inet.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <sys/un.h>
|
|
|
|
#include <netdb.h>
|
|
|
|
#endif
|
|
|
|
|
2019-07-25 12:21:07 -04:00
|
|
|
#include "libclamav/clamav.h"
|
|
|
|
#include "shared/actions.h"
|
|
|
|
#include "shared/output.h"
|
|
|
|
#include "shared/misc.h"
|
2018-12-17 11:47:18 -05:00
|
|
|
|
2019-07-25 12:21:07 -04:00
|
|
|
#include "communication.h"
|
|
|
|
#include "protocol.h"
|
|
|
|
#include "client.h"
|
2018-12-17 11:47:18 -05:00
|
|
|
|
|
|
|
static const char *scancmd[] = { "CONTSCAN", "MULTISCAN", "INSTREAM", "FILDES", "ALLMATCHSCAN" };
|
|
|
|
|
|
|
|
/* Issues an INSTREAM command to clamd and streams the given file
|
|
|
|
* Returns >0 on success, 0 soft fail, -1 hard fail */
|
2019-05-22 15:36:54 -04:00
|
|
|
static int onas_send_stream(CURL *curl, const char *filename, int fd, int64_t timeout, uint64_t maxstream) {
|
2019-04-04 10:43:19 -04:00
|
|
|
uint32_t buf[BUFSIZ/sizeof(uint32_t)];
|
2019-05-22 15:36:54 -04:00
|
|
|
uint64_t len;
|
2019-05-09 12:42:33 -04:00
|
|
|
uint64_t todo = maxstream;
|
2019-05-30 13:29:02 -04:00
|
|
|
int ret = 1;
|
2019-05-22 15:36:54 -04:00
|
|
|
int close_flag = 0;
|
2019-04-04 10:43:19 -04:00
|
|
|
|
2019-05-22 15:36:54 -04:00
|
|
|
if (0 == fd) {
|
|
|
|
if(filename) {
|
2019-04-04 10:43:19 -04:00
|
|
|
if((fd = safe_open(filename, O_RDONLY | O_BINARY))<0) {
|
|
|
|
logg("~%s: Access denied. ERROR\n", filename);
|
|
|
|
return 0;
|
|
|
|
}
|
2019-05-30 13:29:02 -04:00
|
|
|
//logg("DEBUG: >>>>> fd is %d\n", fd);
|
2019-05-22 15:36:54 -04:00
|
|
|
close_flag = 1;
|
|
|
|
} else {
|
|
|
|
fd = 0;
|
|
|
|
}
|
|
|
|
}
|
2019-04-04 10:43:19 -04:00
|
|
|
|
2019-05-30 13:29:02 -04:00
|
|
|
|
2019-05-07 18:00:47 -04:00
|
|
|
if(onas_sendln(curl, "zINSTREAM", 10, timeout)) {
|
2019-05-30 13:29:02 -04:00
|
|
|
ret = -1;
|
|
|
|
goto strm_out;
|
2018-12-17 11:47:18 -05:00
|
|
|
}
|
|
|
|
|
2019-04-04 10:43:19 -04:00
|
|
|
while((len = read(fd, &buf[1], sizeof(buf) - sizeof(uint32_t))) > 0) {
|
2019-05-09 12:42:33 -04:00
|
|
|
if((uint64_t)len > todo) len = todo;
|
2019-04-04 10:43:19 -04:00
|
|
|
buf[0] = htonl(len);
|
2019-05-07 18:00:47 -04:00
|
|
|
if (onas_sendln(curl, (const char *)buf, len+sizeof(uint32_t), timeout)) {
|
2019-05-30 13:29:02 -04:00
|
|
|
ret = -1;
|
|
|
|
goto strm_out;
|
2019-04-04 10:43:19 -04:00
|
|
|
}
|
|
|
|
todo -= len;
|
|
|
|
if(!todo) {
|
|
|
|
len = 0;
|
|
|
|
break;
|
|
|
|
}
|
2018-12-17 11:47:18 -05:00
|
|
|
}
|
2019-05-30 13:29:02 -04:00
|
|
|
|
2019-04-04 10:43:19 -04:00
|
|
|
if(len) {
|
|
|
|
logg("!Failed to read from %s.\n", filename ? filename : "STDIN");
|
2019-05-30 13:29:02 -04:00
|
|
|
ret = 0;
|
|
|
|
goto strm_out;
|
2018-12-17 11:47:18 -05:00
|
|
|
}
|
2019-04-04 10:43:19 -04:00
|
|
|
*buf=0;
|
2019-05-07 18:00:47 -04:00
|
|
|
onas_sendln(curl, (const char *)buf, 4, timeout);
|
2019-05-30 13:29:02 -04:00
|
|
|
|
|
|
|
strm_out:
|
|
|
|
if (close_flag) {
|
|
|
|
//logg("DEBUG: >>>>> closed fd %d\n", fd);
|
|
|
|
close(fd);
|
|
|
|
}
|
|
|
|
return ret;
|
2018-12-17 11:47:18 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef HAVE_FD_PASSING
|
|
|
|
/* Issues a FILDES command and pass a FD to clamd
|
|
|
|
* Returns >0 on success, 0 soft fail, -1 hard fail */
|
2019-05-22 15:36:54 -04:00
|
|
|
static int onas_send_fdpass(CURL *curl, const char *filename, int fd, int64_t timeout) {
|
2019-04-25 16:11:39 -04:00
|
|
|
CURLcode result;
|
2019-04-04 10:43:19 -04:00
|
|
|
struct iovec iov[1];
|
|
|
|
struct msghdr msg;
|
|
|
|
struct cmsghdr *cmsg;
|
|
|
|
unsigned char fdbuf[CMSG_SPACE(sizeof(int))];
|
|
|
|
char dummy[]="";
|
2019-05-30 13:29:02 -04:00
|
|
|
int ret = 1;
|
2019-05-22 15:36:54 -04:00
|
|
|
int close_flag = 0;
|
2019-04-04 10:43:19 -04:00
|
|
|
|
2019-05-22 15:36:54 -04:00
|
|
|
if (0 == fd) {
|
|
|
|
if(filename) {
|
2019-04-04 10:43:19 -04:00
|
|
|
if((fd = open(filename, O_RDONLY))<0) {
|
|
|
|
logg("~%s: Access denied. ERROR\n", filename);
|
|
|
|
return 0;
|
|
|
|
}
|
2019-05-22 15:36:54 -04:00
|
|
|
close_flag = 1;
|
|
|
|
} else {
|
|
|
|
fd = 0;
|
|
|
|
}
|
|
|
|
}
|
2019-05-07 18:00:47 -04:00
|
|
|
if(result = onas_sendln(curl, "zFILDES", 8, timeout)) {
|
2019-04-25 16:11:39 -04:00
|
|
|
logg("*ClamProto: error sending w/ curl, %s\n", curl_easy_strerror(result));
|
2019-05-30 13:29:02 -04:00
|
|
|
ret = -1;
|
|
|
|
goto fd_out;
|
2019-04-04 10:43:19 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
iov[0].iov_base = dummy;
|
|
|
|
iov[0].iov_len = 1;
|
|
|
|
memset(&msg, 0, sizeof(msg));
|
|
|
|
msg.msg_control = fdbuf;
|
|
|
|
msg.msg_iov = iov;
|
|
|
|
msg.msg_iovlen = 1;
|
|
|
|
msg.msg_controllen = CMSG_LEN(sizeof(int));
|
|
|
|
cmsg = CMSG_FIRSTHDR(&msg);
|
|
|
|
cmsg->cmsg_len = CMSG_LEN(sizeof(int));
|
|
|
|
cmsg->cmsg_level = SOL_SOCKET;
|
|
|
|
cmsg->cmsg_type = SCM_RIGHTS;
|
|
|
|
*(int *)CMSG_DATA(cmsg) = fd;
|
2019-05-07 18:00:47 -04:00
|
|
|
if(onas_sendln(curl, &msg, 0, timeout) == -1) {
|
2019-04-04 10:43:19 -04:00
|
|
|
logg("!FD send failed: %s\n", strerror(errno));
|
2019-05-30 13:29:02 -04:00
|
|
|
ret = -1;
|
|
|
|
goto fd_out;
|
2018-12-17 11:47:18 -05:00
|
|
|
}
|
2019-05-30 13:29:02 -04:00
|
|
|
fd_out:
|
2019-05-22 15:36:54 -04:00
|
|
|
if (close_flag) {
|
|
|
|
close(fd);
|
|
|
|
}
|
2019-05-30 13:29:02 -04:00
|
|
|
return ret;
|
2018-12-17 11:47:18 -05:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* Sends a proper scan request to clamd and parses its replies
|
|
|
|
* This is used only in non IDSESSION mode
|
|
|
|
* Returns the number of infected files or -1 on error
|
|
|
|
* NOTE: filename may be NULL for STREAM scantype. */
|
2019-05-22 15:36:54 -04:00
|
|
|
int onas_dsresult(CURL *curl, int scantype, uint64_t maxstream, const char *filename, int fd, int64_t timeout, int *printok, int *errors, cl_error_t *ret_code) {
|
2019-04-04 10:43:19 -04:00
|
|
|
int infected = 0, len = 0, beenthere = 0;
|
|
|
|
char *bol, *eol;
|
|
|
|
struct RCVLN rcv;
|
|
|
|
STATBUF sb;
|
2019-04-25 16:11:39 -04:00
|
|
|
|
|
|
|
onas_recvlninit(&rcv, curl);
|
2019-04-04 10:43:19 -04:00
|
|
|
|
|
|
|
if (ret_code) {
|
|
|
|
*ret_code = CL_SUCCESS;
|
|
|
|
}
|
2018-12-17 11:47:18 -05:00
|
|
|
|
2019-04-04 10:43:19 -04:00
|
|
|
switch(scantype) {
|
|
|
|
case MULTI:
|
|
|
|
case CONT:
|
|
|
|
case ALLMATCH:
|
|
|
|
if (!filename) {
|
|
|
|
logg("Filename cannot be NULL for MULTISCAN or CONTSCAN.\n");
|
|
|
|
if (ret_code) {
|
|
|
|
*ret_code = CL_ENULLARG;
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
len = strlen(filename) + strlen(scancmd[scantype]) + 3;
|
|
|
|
if (!(bol = malloc(len))) {
|
|
|
|
logg("!Cannot allocate a command buffer: %s\n", strerror(errno));
|
|
|
|
if (ret_code) {
|
|
|
|
*ret_code = CL_EMEM;
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
sprintf(bol, "z%s %s", scancmd[scantype], filename);
|
2019-05-07 18:00:47 -04:00
|
|
|
if(onas_sendln(curl, bol, len, timeout)) {
|
2019-04-04 10:43:19 -04:00
|
|
|
if (ret_code) {
|
|
|
|
*ret_code = CL_EWRITE;
|
|
|
|
}
|
|
|
|
free(bol);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
free(bol);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case STREAM:
|
|
|
|
/* NULL filename safe in send_stream() */
|
2019-05-22 15:36:54 -04:00
|
|
|
len = onas_send_stream(curl, filename, fd, timeout, maxstream);
|
2019-04-04 10:43:19 -04:00
|
|
|
break;
|
2018-12-17 11:47:18 -05:00
|
|
|
#ifdef HAVE_FD_PASSING
|
2019-04-04 10:43:19 -04:00
|
|
|
case FILDES:
|
|
|
|
/* NULL filename safe in send_fdpass() */
|
2019-05-22 15:36:54 -04:00
|
|
|
len = onas_send_fdpass(curl, filename, fd, timeout);
|
2019-04-04 10:43:19 -04:00
|
|
|
break;
|
2018-12-17 11:47:18 -05:00
|
|
|
#endif
|
2019-04-04 10:43:19 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
if(len <=0) {
|
2018-12-17 11:47:18 -05:00
|
|
|
*printok = 0;
|
|
|
|
if(errors)
|
2019-04-04 10:43:19 -04:00
|
|
|
(*errors)++;
|
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
2019-05-07 18:00:47 -04:00
|
|
|
while((len = onas_recvln(&rcv, &bol, &eol, timeout))) {
|
2019-04-04 10:43:19 -04:00
|
|
|
if(len == -1) {
|
|
|
|
if (ret_code) {
|
|
|
|
*ret_code = CL_EREAD;
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
beenthere = 1;
|
|
|
|
if(!filename) {
|
2018-12-17 11:47:18 -05:00
|
|
|
logg("~%s\n", bol);
|
|
|
|
}
|
2019-04-04 10:43:19 -04:00
|
|
|
if(len > 7) {
|
|
|
|
char *colon = strrchr(bol, ':');
|
|
|
|
|
|
|
|
if(colon && colon[1] != ' ') {
|
|
|
|
char *br;
|
|
|
|
*colon = 0;
|
|
|
|
|
|
|
|
br = strrchr(bol, '(');
|
|
|
|
if(br) {
|
|
|
|
*br = 0;
|
|
|
|
}
|
|
|
|
colon = strrchr(bol, ':');
|
|
|
|
}
|
|
|
|
|
|
|
|
if(!colon) {
|
|
|
|
char * unkco = "UNKNOWN COMMAND";
|
|
|
|
if (!strncmp(bol, unkco, sizeof(unkco) - 1)) {
|
2019-05-07 18:00:47 -04:00
|
|
|
logg("*clamd replied \"UNKNOWN COMMAND\". Command was %s\n",
|
2019-04-04 10:43:19 -04:00
|
|
|
(scantype < 0 || scantype > MAX_SCANTYPE) ? "unidentified" :
|
|
|
|
scancmd[scantype]);
|
|
|
|
} else {
|
2019-05-07 18:00:47 -04:00
|
|
|
logg("*Failed to parse reply: \"%s\"\n", bol);
|
2019-04-04 10:43:19 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
if (ret_code) {
|
|
|
|
*ret_code = CL_EPARSE;
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
} else if(!memcmp(eol - 7, " FOUND", 6)) {
|
|
|
|
static char last_filename[PATH_MAX+1] = {'\0'};
|
|
|
|
*(eol - 7) = 0;
|
|
|
|
*printok = 0;
|
|
|
|
|
|
|
|
if (scantype != ALLMATCH) {
|
|
|
|
infected++;
|
|
|
|
} else {
|
|
|
|
if (filename != NULL && strcmp(filename, last_filename)) {
|
|
|
|
infected++;
|
|
|
|
strncpy(last_filename, filename, PATH_MAX);
|
|
|
|
last_filename[PATH_MAX] = '\0';
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if(filename) {
|
|
|
|
if(scantype >= STREAM) {
|
|
|
|
logg("~%s%s FOUND\n", filename, colon);
|
|
|
|
if(action) {
|
|
|
|
action(filename);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
logg("~%s FOUND\n", bol);
|
|
|
|
*colon = '\0';
|
|
|
|
if(action) {
|
|
|
|
action(bol);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ret_code) {
|
|
|
|
*ret_code = CL_VIRUS;
|
|
|
|
}
|
|
|
|
|
|
|
|
} else if(len > 49 && !memcmp(eol-50, " lstat() failed: No such file or directory. ERROR", 49)) {
|
|
|
|
if(errors) {
|
|
|
|
(*errors)++;
|
|
|
|
}
|
|
|
|
*printok = 0;
|
|
|
|
|
|
|
|
if(filename) {
|
2019-05-30 13:29:02 -04:00
|
|
|
(scantype >= STREAM) ? logg("*%s%s\n", filename, colon) : logg("*%s\n", bol);
|
2019-04-04 10:43:19 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
if (ret_code) {
|
|
|
|
*ret_code = CL_ESTAT;
|
|
|
|
}
|
2019-05-30 17:44:03 -04:00
|
|
|
} else if(len > 41 && !memcmp(eol-42, " lstat() failed: Permission denied. ERROR", 41)) {
|
|
|
|
if(errors) {
|
|
|
|
(*errors)++;
|
|
|
|
}
|
|
|
|
*printok = 0;
|
|
|
|
|
|
|
|
if(filename) {
|
|
|
|
(scantype >= STREAM) ? logg("*%s%s\n", filename, colon) : logg("*%s\n", bol);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ret_code) {
|
|
|
|
*ret_code = CL_ESTAT;
|
|
|
|
}
|
|
|
|
} else if(len > 21 && !memcmp(eol-22, " Access denied. ERROR", 21)) {
|
|
|
|
if(errors) {
|
|
|
|
(*errors)++;
|
|
|
|
}
|
|
|
|
*printok = 0;
|
2019-04-04 10:43:19 -04:00
|
|
|
|
2019-05-30 17:44:03 -04:00
|
|
|
if(filename) {
|
|
|
|
(scantype >= STREAM) ? logg("*%s%s\n", filename, colon) : logg("*%s\n", bol);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ret_code) {
|
|
|
|
*ret_code = CL_EACCES;
|
|
|
|
}
|
2019-04-04 10:43:19 -04:00
|
|
|
} else if(!memcmp(eol-7, " ERROR", 6)) {
|
|
|
|
if(errors) {
|
|
|
|
(*errors)++;
|
|
|
|
}
|
|
|
|
*printok = 0;
|
|
|
|
|
|
|
|
if(filename) {
|
2019-05-22 15:36:54 -04:00
|
|
|
(scantype >= STREAM) ? logg("~%s%s\n", filename, colon) : logg("~%s\n", bol);
|
2019-04-04 10:43:19 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
if (ret_code) {
|
|
|
|
*ret_code = CL_ESTATE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2018-12-17 11:47:18 -05:00
|
|
|
}
|
2019-04-04 10:43:19 -04:00
|
|
|
if(!beenthere) {
|
|
|
|
if (!filename) {
|
|
|
|
logg("STDIN: noreply from clamd\n.");
|
|
|
|
if (ret_code) {
|
|
|
|
*ret_code = CL_EACCES;
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if(CLAMSTAT(filename, &sb) == -1) {
|
|
|
|
logg("~%s: stat() failed with %s, clamd may not be responding\n",
|
|
|
|
filename, strerror(errno));
|
|
|
|
if (ret_code) {
|
|
|
|
*ret_code = CL_EACCES;
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if(!S_ISDIR(sb.st_mode)) {
|
|
|
|
logg("~%s: no reply from clamd\n", filename);
|
|
|
|
if (ret_code) {
|
|
|
|
*ret_code = CL_EACCES;
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
2018-12-17 11:47:18 -05:00
|
|
|
}
|
2019-04-04 10:43:19 -04:00
|
|
|
return infected;
|
2018-12-17 11:47:18 -05:00
|
|
|
}
|
|
|
|
|