Please remember to submit FP reports here:

http://cgi.clamav.net/sendvirus.cgi

It helps if, when you submit them, you write the list back with the md5's 
involved.  When you submit via the above form it goes right into our Signature 
Database and allows us to analyze them.

--
Joel Esler
Senior Research Engineer, VRT
OpenSource Community Manager
Sourcefire

On May 24, 2012, at 5:39 AM, Al Varnell wrote:

> The previous issue around 11 May were with BC.Exploit.CVE_2012_0184 (without
> "-3") so I think this may be something new.
> 
> 
> -Al-
> 
> -- 
> Al Varnell
> Mountain View, CA
> 
> On 5/24/12 2:03 AM, "Henry Jensen" <hjen...@gmx.de> wrote:
> 
>> Hello
>> 
>> I still got many BC.Exploit.CVE_2012_0184-3 false positives, mainly MS Office
>> and PDF  files:
>> 
>> Dokument_040803.doc: BC.Exploit.CVE_2012_0184-3 FOUND
>> ErgerC_SPE-method_Wasser 2011_20120419.ppt: BC.Exploit.CVE_2012_0184-3 FOUND
>> Sicherheitsdatenblatt Methotrexat.pdf: BC.Exploit.CVE_2012_0184-3 FOUND
>> 
>> Signatures are current:
>> 
>> Thu May 24 10:33:51 2012 -> main.cvd is up to date (version: 54, sigs:
>> 1044387, f-level: 60, builder: sven)
>> Thu May 24 10:33:51 2012 -> daily.cld is up to date (version: 14958, sigs:
>> 180345, f-level: 63, builder: ccordes)
>> Thu May 24 10:33:51 2012 -> bytecode.cld is up to date (version: 184, sigs:
>> 40, f-level: 63, builder: neo)
>> 
> 
> 
> _______________________________________________
> Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
> http://www.clamav.net/support/ml

_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to