I'm getting the same alerts on multiple Linux servers. Mostly on tar.gz
files which have been created a long time ago and have not been changed
since (no tripwire alerts).

When I unpack the tarballs and scan the content I don't get any alter.



Al Varnell wrote:
> Daily 15462 today contained the following:
> 
> Submission-ID: 53018933
> Sender: Anonymous 
> Added: PHP.Exploit.CVE_2011_4153-2
> 
> A ClamXav user reported that a scan of his hard drive reported the following
> file to be infected:
> 
> /usr/lib/php/install-pear-nozlib.phar
> 
> This file appears to be a shell script to install the PHP Extension and
> Application Repository (PEAR) described by WikipediA @
> <http://en.wikipedia.org/wiki/PEAR> and is also available @
> <http://en.wikipedia.org/wiki/PEAR>.
> 
> I've verified with several users now that this seems to have been part of
> every OS X distribution since version 10.6.x.
> 
> I have submitted it as a False Positive earlier today and expect the
> signature team will resolve it shortly.
> 
> 
> 
> -Al-
>  

-- 
 TyrannoDouwes, Rex

 jabber: arthur.dou...@gmail.com
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to