John Rudd schrieb:
> (filed as bug 631, but it's nothing new: CL_SCAN_STDOPT still doesn't 
> include CL_SCAN_PHISHING_DOMAINLIST; that omission can cause crashing 
> and hanging on certain platforms ... the clamav team already knows about 
> this problem, and they even enable that option as a default in clamscan, 
> just not in the CL_SCAN_STDOPT defined value ... my suggestion is to not 
> upgrade until they release a version that fixes this problem)

Browsing the source, I see that clamd also sets this by default, and
would even emit a log message:

"Phishing: Checking all URLs, regardless of domain (FP prone).\n"

if overridden by the PhishingScanURLs option in clamd.conf.

So am I correct in assuming that clamd isn't vulnerable as long as that
warning message does not appear in the log, and that users of either
clamd or clamscan can upgrade without fear?

Thanks,
Tilman

-- 
Tilman Schmidt
Abteilungsleiter Technik
------------------------------------------------------------------------
Tilman Schmidt                              [EMAIL PROTECTED]
Phoenix Software GmbH                               Tel. +49 228 97199 0
Geschäftsführer: W. Grießl                         Fax  +49 228 97199 99
Adolf-Hombitzer-Str. 12                           www.phoenixsoftware.de
53227 Bonn, Germany                            Amtsgericht Bonn HRB 2934
------------------------------------------------------------------------

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html

Reply via email to