Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

Can ClamXav detect Trojans and other spyware?

The Question is as above in the title.


Also, I think I downloaded an old version of Messenger for Mac.

It probably have no sort of malware or viruses but assuming it may have, does the "sandboxing" technique by Apple prevent any malware from interfering with my mac. And does deleting tha old version clear any malware associated with it as well?


Thanks

MacBook Pro, Mac OS X (10.7.3)

Posted on Feb 10, 2012 2:44 PM

Reply
12 replies

Feb 10, 2012 3:01 PM in response to Davidc93

To answer your subject line, that's exactly what ClamXav is for. However, to answer all the rest of your post, see my Mac Malware Guide.


Also, note that there has been a new development today. You should update Java ASAP, if you have it installed. See Flashback using Java vulnerabilities.


(Note that my pages contain links to other pages that promote my services, and this should not be taken as an endorsement of my services by Apple.)

Feb 10, 2012 3:53 PM in response to Zyriab

Thomas, I read your article but you didn't state what the latest version of Java is. I did as you suggested and opened Java Preferences which reports my Java version as 1.6.0_29-b11-402. Do you know if this is the secured version? Software Update says my system is up-to-date.


Yes, I don't have Java, so I wasn't able to check what's on my machine, but from what I've been able to determine, that's the most recent version available through Software Update. Of course, there are beta versions of a newer Java out there, and Intego was quite vague. Their article did not identify which versions of Java are vulnerable. So I'm guessing you're probably okay, but it's too soon and the information is not good enough to be 100% sure.

Feb 10, 2012 6:56 PM in response to Davidc93

I'm not certain that you received a direct answer to this question...


> trojans have to be installed through the admin password. Is that true?


Although that has been true for most all Trojans to date, there have been recent varieties of FlashBack that do not. One showed up over a month ago that required the user's permission, but not an admin password and now this most recent one that Thomas alerted you to that can use a vulnerable Java, but can still install itself with your permission even if you have the patched Java.

Feb 14, 2012 1:26 PM in response to thomas_r.

From the Mac Security Blog, Intego did mention which versions of Java are secure: "[T]he current version of Java for Mac OS X has patched the vulnerabilities that are being exploited."


Current Java version:

User uploaded file


Based on what is mentioned there, it seems reasonably safe to assume if you have Java, and there are no updates available in Software Update, then you're ok, at least for the Java vulnerabilities (but not the self-signed certificate).

Feb 14, 2012 2:04 PM in response to Tycoon24

Yes, it's reasonably safe to assume that, but I don't like having to make assumptions in this area. I believe that a security company should, when describing an exploit that takes advantage of a vulnerability, be precise about which versions of the software in question have and do not have the vulnerability. It's unlikely but possible that they are considering the latest beta release the "current version." Though I have since been informed that there are no new security fixes in the latest Java beta release that aren't in 1.6.0_29-b11-402, so that pretty well clinches it... but I'm still a stickler for specifics!

Feb 14, 2012 2:51 PM in response to Tycoon24

Tycoon24 wrote:


From the Mac Security Blog, Intego did mention which versions of Java are secure: "[T]he current version of Java for Mac OS X has patched the vulnerabilities that are being exploited."

Which is fine if you are running an Apple supported Mac OS X, but for those still on Legacy systems before 10.6, there won't be any more Apple updates. I was looking forward to Oracle taking responsibility for that, but have not seen any progress on that front. Apple was always slow with Java updates.


With Mac OS X 10.5.8 I see I have J2SE 5.0 v1.5.0_30-b03 and S2SE 1.4.2 v1.4.2_22 (disabled by default). I need to do some homework to see if Oracle has done an update, but it would also have been nice for Intego to tell us if either of these have that vulnerability. In any case, there is currently no way for Mac users to update either of these.

Can ClamXav detect Trojans and other spyware?

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.