> Nbr 5) EICAR virus sent using BinHex encoding

This was also missed on my ClamAV 0.65 running as clamd, however it was
picked up by Amavisd-new for its extension.
(Running ClamAV 0.65, Postfix 2.0.13, Amavisd-new-20030616-p5)

> I do not care about the second section of the test virus web page, since I
do
> not run OE.  I do have OE clients, but they run their own Windows
anti-virus
> package.

I also have OE clients (and MS Outlook Clients, which I believe also are
vulnerable to the second section), and they use desktop AV as well.
However, I'd like these to be caught by defense-in-depth.  I haven't had
time to research the "bugs" that testvirus/webmail.us says "MUST BE CAUGHT!"
(emphasis added) by a mailserver, but I'll be tracking them down with
amavisd-new experts as well.

I mean, hey, if there's a pattern/signature to these threats, _something_
I'm using should catch it.

--Seth



-------------------------------------------------------
This SF.net email is sponsored by: Perforce Software.
Perforce is the Fast Software Configuration Management System offering
advanced branching capabilities and atomic changes on 50+ platforms.
Free Eval! http://www.perforce.com/perforce/loadprog.html
_______________________________________________
Clamav-users mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/clamav-users

Reply via email to