> -----Original Message----- > From: Ken Jones [mailto:[EMAIL PROTECTED] > Subject: Re: [Clamav-users] Clamav and the CR Vulnerability > > > I sent it to my server as well, and it was caught. Clamav 80.
Did you just do this? I tried looking at the source of the email I received and I don't see an eicar test signature anywhere... Where would this be located in the raw email source? > What os are you using, how did you get / build / install clam ? RHES 3.0, ClamAV 0.80, Simscan (latest CVS)... I download the .tar.gz file from the clamav website and roll it into an RPM. Specifically, the configure line looks like this (copied from config.log): ./configure --host=i686-redhat-linux-gnu \ --build=i686-redhat-linux-gnu \ --target=i386-redhat-linux \ --program-prefix= \ --prefix=/usr \ --exec-prefix=/usr \ --bindir=/usr/bin \ --sbindir=/usr/sbin \ --sysconfdir=/etc \ --datadir=/usr/share \ --includedir=/usr/include \ --libdir=/usr/lib \ --libexecdir=/usr/libexec \ --localstatedir=/var \ --sharedstatedir=/usr/com \ --mandir=/usr/share/man \ --infodir=/usr/share/info \ --program-prefix= \ --disable-clamav \ --enable-id-check \ --with-tcpwrappers \ --with-user=clamav \ --with-group=clamav \ --with-dbdir=/var/lib/clamav > -- > Ken Jones > [EMAIL PROTECTED] -- Jason Frisvold Penteledata _______________________________________________ http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users