From dcecff4e391ffcf3a7da117b7e0d8c9957496b5e Mon Sep 17 00:00:00 2001 From: decalage2 Date: Fri, 14 Jul 2017 21:13:17 +0200 Subject: [PATCH] rtfobj: disabled logging of each control word (issue #184) --- oletools/rtfobj.py | 7 ++++--- setup.py | 2 +- 2 files changed, 5 insertions(+), 4 deletions(-) diff --git a/oletools/rtfobj.py b/oletools/rtfobj.py index 2e47722..a1ccca6 100644 --- a/oletools/rtfobj.py +++ b/oletools/rtfobj.py @@ -73,8 +73,9 @@ http://www.decalage.info/python/oletools # 2017-05-04 PL: - fixed issue #164 to handle linked OLE objects # 2017-06-08 PL: - fixed issue/PR #143: bin object with negative length # 2017-06-29 PL: - temporary fix for issue #178 +# 2017-07-14 v0.51.1 PL: - disabled logging of each control word (issue #184) -__version__ = '0.51' +__version__ = '0.51.1dev2' # ------------------------------------------------------------------------------ # TODO: @@ -389,7 +390,7 @@ class RtfParser(object): param = None if len(m.groups()) > 1: param = m.group(2) - # log.debug('control word %r at index %Xh - cword=%r param=%r' % (m.group(), self.index, cword, param)) + # log.debug('control word at index %Xh - cword=%r param=%r %r' % (self.index, cword, param, m.group())) self._control_word(m, cword, param) self.index += len(m.group()) # if it's \bin, call _bin after updating index @@ -632,7 +633,7 @@ class RtfObjParser(RtfParser): # TODO: extract useful cwords such as objclass # TODO: keep track of cwords inside objdata, because it is unusual and indicates potential obfuscation # TODO: same with control symbols, and opening bracket - log.debug('- Control word "%s", param=%s, level=%d' % (cword, param, self.group_level)) + # log.debug('- Control word "%s", param=%s, level=%d' % (cword, param, self.group_level)) pass diff --git a/setup.py b/setup.py index d826945..a4e221a 100644 --- a/setup.py +++ b/setup.py @@ -41,7 +41,7 @@ import os, fnmatch #--- METADATA ----------------------------------------------------------------- name = "oletools" -version = '0.51.1dev1' +version = '0.51.1dev2' desc = "Python tools to analyze security characteristics of MS Office and OLE files (also called Structured Storage, Compound File Binary Format or Compound Document File Format), for Malware Analysis and Incident Response #DFIR" long_desc = open('oletools/README.rst').read() author = "Philippe Lagadec" -- libgit2 0.21.4