Steve Wray wrote:
> Noel Jones wrote:
>> Steve Wray wrote:
>>> Hi there,
>>> I'm not sure this is the right mailing list for this but here goes anyway.
>>>
>>> I need to find out if I am dealing with a false positive or with a real 
>>> problem.
>>>
>>> I've been running clamav over some of our webservers content for the 
>>> past year or so and it has never found anything (apart from the eicar 
>>> test signature that I occasionaly drop in there to make sure the system 
>>> is working properly).
>>>
>>> It recently found something on two of our servers. Both servers run moodle.
>>>
>>> Clamav identifies it as JS.Dropper-14
>>>
>>> The file concerned downloaded directly from the moodle site is also 
>>> identified as being infected though its a different version of the file 
>>> and differs slightly.
>>>
>>> You can find it here:
>>>
>>> http://cvs.moodle.org/moodle/mod/quiz/protect_js.php
>>>
>>> I've had our developers going over this code and they can't find 
>>> anything suspicious about it. Personally I'm suspicious of the huge 
>>> block of binary data... but I'm not really a programmer.
>>>
>>> Please advise.
>>>
>> get the opinion of many other scanners by submitting the file 
>> to http://virusscan.jotti.org/  or  http://www.virustotal.com/
>>
>> If nothing else finds it suspicious, submit the file as a 
>> false positive at
>> http://www.clamav.org/sendvirus/
> 
> Ok well one other thing did find it suspicious:
> 
> Panda 9.0.0.4 2008.03.02      Exploit/IFrame.FileDownload
> 
> nothing else did though.
> 
> At what point should I start to worry about this?
> :-/
> 
> 

Submit it as a false positive and let the clamav signature 
team evaluate it.

-- 
Noel Jones
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html

Reply via email to