Daily 15462 today contained the following:

Submission-ID: 53018933
Sender: Anonymous 
Added: PHP.Exploit.CVE_2011_4153-2

A ClamXav user reported that a scan of his hard drive reported the following
file to be infected:

/usr/lib/php/install-pear-nozlib.phar

This file appears to be a shell script to install the PHP Extension and
Application Repository (PEAR) described by WikipediA @
<http://en.wikipedia.org/wiki/PEAR> and is also available @
<http://en.wikipedia.org/wiki/PEAR>.

I've verified with several users now that this seems to have been part of
every OS X distribution since version 10.6.x.

I have submitted it as a False Positive earlier today and expect the
signature team will resolve it shortly.



-Al-
 
-- 
Al Varnell
Mountain View, CA



_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to