On -10/01/37 20:59, Johannes Schulz wrote: > "sigtool -fPUA.PDF.OpenActionObject|sigtool --decode-sigs" says: > VIRUS NAME: PUA.PDF.OpenActionObject > TARGET TYPE: ANY FILE > OFFSET: 0 > DECODED SIGNATURE: > %PDF-{WILDCARD_ANY_STRING}obj{WILDCARD_ANY_STRING(LENGTH<=2)}<<{WILDCARD_ANY_STRING}/OpenAction
Hi, As of today a bunch of old PDFs on my system were also flagged with this. They had been composed in OpenOffice.org Writer and contained: > /OpenAction[1 0 R /XYZ null null 0] Also due to the same update (daily 13008) I had a ~1MiB PDF document made by ImageMagick flagged by: > VIRUS NAME: PUA.PDF.EmbeddedJS > TARGET TYPE: ANY FILE > OFFSET: 0 > DECODED SIGNATURE: > %PDF-{WILDCARD_ANY_STRING}obj{WILDCARD_ANY_STRING(LENGTH<=2)}<<{WILDCARD_ANY_STRING}/JS ...because halfway through the file, inside some image data, were the characters "/JS". Surely this is going to cause many false detections? Like maybe 1 in 16 out of all PDFs over 1MiB. Regards, -- Steven Chamberlain ste...@pyro.eu.org _______________________________________________ Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net http://www.clamav.net/support/ml