Please remember to submit FP reports here: http://cgi.clamav.net/sendvirus.cgi
It helps if, when you submit them, you write the list back with the md5's involved. When you submit via the above form it goes right into our Signature Database and allows us to analyze them. -- Joel Esler Senior Research Engineer, VRT OpenSource Community Manager Sourcefire On May 24, 2012, at 5:39 AM, Al Varnell wrote: > The previous issue around 11 May were with BC.Exploit.CVE_2012_0184 (without > "-3") so I think this may be something new. > > > -Al- > > -- > Al Varnell > Mountain View, CA > > On 5/24/12 2:03 AM, "Henry Jensen" <hjen...@gmx.de> wrote: > >> Hello >> >> I still got many BC.Exploit.CVE_2012_0184-3 false positives, mainly MS Office >> and PDF files: >> >> Dokument_040803.doc: BC.Exploit.CVE_2012_0184-3 FOUND >> ErgerC_SPE-method_Wasser 2011_20120419.ppt: BC.Exploit.CVE_2012_0184-3 FOUND >> Sicherheitsdatenblatt Methotrexat.pdf: BC.Exploit.CVE_2012_0184-3 FOUND >> >> Signatures are current: >> >> Thu May 24 10:33:51 2012 -> main.cvd is up to date (version: 54, sigs: >> 1044387, f-level: 60, builder: sven) >> Thu May 24 10:33:51 2012 -> daily.cld is up to date (version: 14958, sigs: >> 180345, f-level: 63, builder: ccordes) >> Thu May 24 10:33:51 2012 -> bytecode.cld is up to date (version: 184, sigs: >> 40, f-level: 63, builder: neo) >> > > > _______________________________________________ > Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net > http://www.clamav.net/support/ml _______________________________________________ Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net http://www.clamav.net/support/ml