[jitsi-users] clamAV warning about Jitsi Meet


#1

Hello list,

our clamav reported the following findings last night:

[clamAV_Log 16.03.2017 23:00:01] /usr/share/jitsi-meet/libs/lib-jitsi-meet.min.js: Html.Exploit.CVE_2017_0141-6003839-0 FOUND
[clamAV_Log 16.03.2017 23:00:01] /usr/share/jitsi-meet/libs/lib-jitsi-meet.min.map: Html.Exploit.CVE_2017_0141-6003839-0 FOUND

As there are other projects, suddenly suffering from the same infection
and https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0141
seems to be quite empty, I would assume, that this is a false positive.

Can anyone here confirm this assumption?

Kind regards
Joern

Tel. 0221 / 95 64 95 434
email jott.ext@cardtech.de

···

--
cardtech
Card & Pos Service GmbH
Richard-Byrd-Straße 37
50829 Köln
www.cardtech.de
AG Köln, HRB 20164
Geschäftsführer: Dr. Dietrich Gottwald, Christof Kohns


#2

Hi,

Thanks for getting in touch! CVEs are usually assigned and then vulns are disclosed a bit later, so it’s possible one of our dependencies has a real issue, but it’s impossible to know until it’s disclosed.

Cheers,

···

On Mar 17, 2017, at 16:09, Jörn Ott <jott.ext@cardtech.de> wrote:

Hello list,

our clamav reported the following findings last night:

[clamAV_Log 16.03.2017 23:00:01] /usr/share/jitsi-meet/libs/lib-jitsi-meet.min.js: Html.Exploit.CVE_2017_0141-6003839-0 FOUND
[clamAV_Log 16.03.2017 23:00:01] /usr/share/jitsi-meet/libs/lib-jitsi-meet.min.map: Html.Exploit.CVE_2017_0141-6003839-0 FOUND

As there are other projects, suddenly suffering from the same infection
and https://urldefense.proofpoint.com/v2/url?u=https-3A__www.cve.mitre.org_cgi-2Dbin_cvename.cgi-3Fname-3DCVE-2D2017-2D0141&d=DwIGaQ&c=wBUwXtM9sKhff6UeHOQgvw&r=-T6Cew-S4Ei-6rhDWu1AY-o1ETORq5uAicdns9fSwgI&m=Vb_8ZED1lxgWiP_LDTjt_GjSWwhI6PHTXXq73b9jSMo&s=gsSOpWgQCTnzLndwJIfCQVOvPw37vN_Vx5lDG1tLoRk&e=
seems to be quite empty, I would assume, that this is a false positive.

Can anyone here confirm this assumption?

--
Saúl