Skip Menu |
 

This queue is for tickets about the PAR-Packer CPAN distribution.

Report information
The Basics
Id: 127918
Status: open
Priority: 0/
Queue: PAR-Packer

People
Owner: Nobody in particular
Requestors: jeff [...] hemmerling.net
Cc:
AdminCc:

Bug Information
Severity: (no value)
Broken in: (no value)
Fixed in: (no value)



Subject: PAR::Packer produces executable with virus
Date: Tue, 4 Dec 2018 17:29:55 -0800
To: bug-PAR-Packer [...] rt.cpan.org
From: Jeff Hemmerling <jeff [...] hemmerling.net>
Download (untitled) / with headers
text/plain 816b
Windows Defender and Antiy-AVL are reporting that all executables produced by Packer contain a virus (report from virustotal.com): Microsoft: Trojan:Win32/Skeeyah.A!rfn Antiy-AVL: Trojan/Win32.Miner It also reports that "boot.exe", the Packer intermediate file, also has this virus. This caused the installation to fail because "boot.exe" got quarantined as soon as it was produced. After white-listing the entire perl tree, installation succeeded. We use Packer to produce a complete executable for the convenience of our customers. While our developers can tell Windows Defender to ignore these files, our customers can not be expected to do the same. Since Defender is commonly used, this is a big issue. Any idea of a work around? Have others encountered this issue? Thank you. -- -- Jeff Hemmerling
Download (untitled) / with headers
text/plain 438b
In the past I'd experienced problems installing pp on windows in a corporate environment, caused by over sensitive AV/Security software. Once resolved the exes generated didn't exhibit the problem you're experiencing, but it's not unheard of: https://perlmonks.org/?node_id=1222404 I trust you've ensured that the machine itself has no underlying infection? Also, which version of perl do you have installed (AS/Strawberry, x86/x86_64?)
Subject: Re: [rt.cpan.org #127918] PAR::Packer produces executable with virus
Date: Wed, 19 Dec 2018 15:51:50 -0800
To: bug-PAR-Packer [...] rt.cpan.org
From: Jeff Hemmerling <jeff [...] hemmerling.net>
Download (untitled) / with headers
text/plain 1018b
On 12/05/2018 02:13, Martin McGrath via RT wrote: Show quoted text
> <URL: https://rt.cpan.org/Ticket/Display.html?id=127918 > > > In the past I'd experienced problems installing pp on windows in a corporate environment, caused by over sensitive AV/Security software. Once resolved the exes generated didn't exhibit the problem you're experiencing, but it's not unheard of: > > https://perlmonks.org/?node_id=1222404 > > I trust you've ensured that the machine itself has no underlying infection? Also, which version of perl do you have installed (AS/Strawberry, x86/x86_64?)
Thanks for your reply. I know it's Packer code causing the problem because the virus detector goes off as soon as "boot.exe" is produced during installation. I just rewrote the code in C++ to avoid all this. Using 32-bit Strawberry perl: % /apps/devtools/Strawberry/perl/bin/perl.exe --version This is perl 5, version 28, subversion 0 (v5.28.0) built for MSWin32-x86-multi-thread-64int Copyright 1987-2018, Larry Wall -- -- Jeff Hemmerling


This service is sponsored and maintained by Best Practical Solutions and runs on Perl.org infrastructure.

Please report any issues with rt.cpan.org to rt-cpan-admin@bestpractical.com.