Since the SCO virus has a list of common first names it couples with domains 
it finds, one of our employees, "[EMAIL PROTECTED]" got a bunch of 
undeliverable bounces back (unknown users, etc.). These bounces contain the 
full virus in the form of the complete source of the original email dumped at 
the end of the bounce message. Although I'm sure the MIME is no longer set up 
right so it may be harmles, Norton seems to catch these while ClamAV does 
not. I'm running a CVS snapshot of ClamAV from yesterday (the 26th) and run 
Freshclam every hour. It seems to be catching other forms of the SCO virus, 
just not these bounces.

I've sent this same message to [EMAIL PROTECTED] with an attached example 
bounce. But I didn't want to violate the "DO NOT SEND VIRII HERE!!! Send them 
to [EMAIL PROTECTED]" rule. ;-) I can send anybody else an example on 
request.
-- 
Matt
Systems Administrator
Local Access Communications
360.330.5535




-------------------------------------------------------
The SF.Net email is sponsored by EclipseCon 2004
Premiere Conference on Open Tools Development and Integration
See the breadth of Eclipse activity. February 3-5 in Anaheim, CA.
http://www.eclipsecon.org/osdn
_______________________________________________
Clamav-users mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/clamav-users

Reply via email to