<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Endpoint for linux - execute malware in /tmp in Endpoint</title>
    <link>https://community.checkpoint.com/t5/Endpoint/Endpoint-for-linux-execute-malware-in-tmp/m-p/197333#M7778</link>
    <description>&lt;P&gt;Please review the limitations stated in&amp;nbsp;&lt;SPAN&gt;sk170198 and clarify further with TAC where needed.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 07 Nov 2023 14:52:53 GMT</pubDate>
    <dc:creator>Chris_Atkinson</dc:creator>
    <dc:date>2023-11-07T14:52:53Z</dc:date>
    <item>
      <title>Endpoint for linux - execute malware in /tmp</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Endpoint-for-linux-execute-malware-in-tmp/m-p/197331#M7777</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are installing the Endpoint on linux clients, and we are able to download and execute malware in /tmp (recursively).&lt;/P&gt;&lt;P&gt;Since I can't find any exclusion for this folder, and did not found documentation on it, I'm asking if someone already had this issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If Yes, how did you get rid of this behavior ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is an example :&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;root@XXX:/tmp# wget &lt;A href="https://secure.eicar.org/eicar.com.txt" target="_blank"&gt;https://secure.eicar.org/eicar.com.txt&lt;/A&gt;&lt;/STRONG&gt;&lt;BR /&gt;--2023-11-07 15:39:13-- &lt;A href="https://secure.eicar.org/eicar.com.txt" target="_blank"&gt;https://secure.eicar.org/eicar.com.txt&lt;/A&gt;&lt;BR /&gt;Resolving secure.eicar.org (secure.eicar.org)... 89.238.73.97, 2a00:1828:1000:2497::2&lt;BR /&gt;Connecting to secure.eicar.org (secure.eicar.org)|89.238.73.97|:443... connected.&lt;BR /&gt;HTTP request sent, awaiting response... 200 OK&lt;BR /&gt;Length: 68 [text/plain]&lt;BR /&gt;Saving to: ‘eicar.com.txt’&lt;/P&gt;&lt;P&gt;eicar.com.txt 100%[============================================================&amp;gt;] 68 --.-KB/s in 0s&lt;/P&gt;&lt;P&gt;2023-11-07 15:39:18 (14,5 MB/s) - ‘eicar.com.txt’ saved [68/68]&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;root@XXX:/tmp# ls&lt;/STRONG&gt;&lt;BR /&gt;...&lt;BR /&gt;eicar.com.txt&lt;/P&gt;&lt;P&gt;...&lt;BR /&gt;&lt;STRONG&gt;root@XXX:/tmp# cat eicar.com.txt&amp;nbsp;&lt;/STRONG&gt;&lt;EM&gt;&amp;lt;-- This is blocked when working in /home/...&lt;/EM&gt;&lt;BR /&gt;X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your help.&lt;/P&gt;&lt;P&gt;Christophe&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2023 14:48:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Endpoint-for-linux-execute-malware-in-tmp/m-p/197331#M7777</guid>
      <dc:creator>mistercinux</dc:creator>
      <dc:date>2023-11-07T14:48:37Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint for linux - execute malware in /tmp</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Endpoint-for-linux-execute-malware-in-tmp/m-p/197333#M7778</link>
      <description>&lt;P&gt;Please review the limitations stated in&amp;nbsp;&lt;SPAN&gt;sk170198 and clarify further with TAC where needed.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2023 14:52:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Endpoint-for-linux-execute-malware-in-tmp/m-p/197333#M7778</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-11-07T14:52:53Z</dc:date>
    </item>
  </channel>
</rss>

