John Rudd schrieb: > (filed as bug 631, but it's nothing new: CL_SCAN_STDOPT still doesn't > include CL_SCAN_PHISHING_DOMAINLIST; that omission can cause crashing > and hanging on certain platforms ... the clamav team already knows about > this problem, and they even enable that option as a default in clamscan, > just not in the CL_SCAN_STDOPT defined value ... my suggestion is to not > upgrade until they release a version that fixes this problem)
Browsing the source, I see that clamd also sets this by default, and would even emit a log message: "Phishing: Checking all URLs, regardless of domain (FP prone).\n" if overridden by the PhishingScanURLs option in clamd.conf. So am I correct in assuming that clamd isn't vulnerable as long as that warning message does not appear in the log, and that users of either clamd or clamscan can upgrade without fear? Thanks, Tilman -- Tilman Schmidt Abteilungsleiter Technik ------------------------------------------------------------------------ Tilman Schmidt [EMAIL PROTECTED] Phoenix Software GmbH Tel. +49 228 97199 0 Geschäftsführer: W. Grießl Fax +49 228 97199 99 Adolf-Hombitzer-Str. 12 www.phoenixsoftware.de 53227 Bonn, Germany Amtsgericht Bonn HRB 2934 ------------------------------------------------------------------------
signature.asc
Description: OpenPGP digital signature
_______________________________________________ Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net http://lurker.clamav.net/list/clamav-users.html