> -----Original Message-----
> From: Ken Jones [mailto:[EMAIL PROTECTED] 
> Subject: Re: [Clamav-users] Clamav and the CR Vulnerability
> 
> 
> I sent it to my server as well, and it was caught. Clamav 80.

Did you just do this?  I tried looking at the source of the email I received and I 
don't see an eicar test signature anywhere...  Where would this be located in the raw 
email source?

> What os are you using, how did you get / build / install clam ?
 
RHES 3.0, ClamAV 0.80, Simscan (latest CVS)...

I download the .tar.gz file from the clamav website and roll it into an RPM.  
Specifically, the configure line looks like this (copied from config.log):

./configure --host=i686-redhat-linux-gnu \
            --build=i686-redhat-linux-gnu \
            --target=i386-redhat-linux \
            --program-prefix= \
            --prefix=/usr \
            --exec-prefix=/usr \
            --bindir=/usr/bin \
            --sbindir=/usr/sbin \
            --sysconfdir=/etc \
            --datadir=/usr/share \
            --includedir=/usr/include \
            --libdir=/usr/lib \
            --libexecdir=/usr/libexec \
            --localstatedir=/var \
            --sharedstatedir=/usr/com \
            --mandir=/usr/share/man \
            --infodir=/usr/share/info \
            --program-prefix= \
            --disable-clamav \
            --enable-id-check \
            --with-tcpwrappers \
            --with-user=clamav \
            --with-group=clamav \
            --with-dbdir=/var/lib/clamav
 
> -- 
> Ken Jones
> [EMAIL PROTECTED]


--
Jason Frisvold
Penteledata

_______________________________________________
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users

Reply via email to