Open wodin opened 2 years ago
Rust started using different Windows API calls in commit 4f0ad1c92ca08da6e8dc17838070975762f59714 (cc @ChrisDenton) to deal with CVE-2022-21658. Virus scanners are often based on heuristics, and it's quite possible that this change made it look similar in some way to patterns found in a known virus.
15 scanners flagged it, but they're a minority against the 48 that did not!
Sure, I suspect it's a false positive. Still, it seems worth trying to do something about it?
"Only 15 of 63 flagged it as malicious" is not that comforting :)
This only affects the 32bit dll, right? Hmm... my local scanner doesn't report anything, does yours have a way to report false positives? Malware scanning is a bit outside my expertise unfortunately.
Yes, only that specific dll is detected.
You can upload a file to virustotal.com to have it scanned by a bunch of different antivirus products.
Reporting seems to be a matter of contacting each vendor who detects the file :-/
I've reported it to my antivirus vendor here: https://www.bitdefender.com/consumer/support/answer/29358/
EDIT: Closed issue by mistake and have reopened it. I have seen some mentions of "VirusTotalMonitor" which is supposed to allow you to get notified early of this sort of thing for software you're developing, but the links are broken 🤷♂️
In general AV issues should be reported to AV vendors. We cannot really do anything about their invalid heuristics, and most of us aren't their clients.
A compiler toolchain, essentially by definition, "does something suspicious": generate a new program and then run it, potentially trashing existing files somewhere along the way. Why, do you know what does that? Viruses do that! It is a small miracle of programming and perhaps tribute to antivirus creators that the Rust toolchain is not always detected as a virus... or maybe a bug, since, naturally, Rust's libstd contains the necessary machine code to, if it is executed, do various nasty things.
Rustup (for Linux) and the Rust std*.dll for x86-64 Windows are both also flagged:
Though it seems most ELF programs and libraries, including our libstd.so, are completely pure in the eyes of VirusTotal. :innocent:
FWIW, the number of vendors/products that flag i686-pc-windows-msvc/lib/std-41d48f5938a7bd14.dll as malicious has now dropped to 5.
4 today, as it turns out!
Down to 3 on this report:
I ran a new VirusTotal on some recent nightly stdlibs, apparently 1 for x86_64-pc-windows-msvc and one for i686-pc-windows-msvc, now:
I have taken the liberty of reporting the holdouts to their support teams, with the exception of Rising Antivirus (I was not able to find anywhere to report it).
I will let everyone know how my support tickets go, and then assuming I hear back from people, I will likely close this issue as complete, and simply let everyone know which antivirus companies refuse to correct their scanners. That is the only degree to which the ticket is actionable, so it is the action to take.
https://www.virustotal.com/gui/file/59999133cb236b67fa8c354aa62f549c34ca9b7a68d42c0ceba0c6a6dcb2e467 only has a single detection from a smaller av vendor right now. https://www.virustotal.com/gui/file/b6e83e624f0696e36cad956deed855709a5bd1fbc4bd575cfc611f4fbe9809e0 has a single detection from mcafee-gw-edition and https://www.virustotal.com/gui/file/90a0082841e7bbe4cf11cbe09746e8daf73a66843fb4f1372aaeaf4ff9b18ea4 doesn't have any detection right now.
Yes, except for the Zillya holdout, everyone responded positively. Don't know why McAfee is still flagging. Zillya wanted me to submit more binaries directly to them for them to understand what I meant.
I upgraded to rust 1.58.1 using rustup (installed from Homebrew) on my Apple M1 Mac and my antivirus software quarantined one of the DLLs with the following message:
I uploaded it to Virustotal and found that several antivirus vendors detect it as malicious: