Can you zip these up, password protect the zip and email them to v...@sourcefire.com?
Matt On Tue, Nov 20, 2012 at 4:23 AM, Anssi Johansson <cla...@miuku.net> wrote: > Hi, > > $ clamscan php*.bz2 > php-5.4.0.tar.bz2: PHP.Exploit.CVE_2011_4153-3 FOUND > php-5.4.1.tar.bz2: PHP.Exploit.CVE_2011_4153-3 FOUND > php-5.4.3.tar.bz2: PHP.Exploit.CVE_2011_4153-3 FOUND > > $ md5sum php*.bz2 > 04bb6f9d71ea86ba05685439d50db074 php-5.4.0.tar.bz2 > 5b9529ed89dbc48c498e9693d1af3caf php-5.4.1.tar.bz2 > 51f9488bf8682399b802c48656315cac php-5.4.3.tar.bz2 > > $ clamscan --version > ClamAV 0.97.6/15602/Mon Nov 19 23:29:58 2012 > > I tried submitting these as false positives through the FP reporting page > some days ago, but the FP submit page said that "This file is not detected > by ClamAV." > > The md5sums of those files match the md5sums published on > http://php.net/releases/index.php > _______________________________________________ > Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net > http://www.clamav.net/support/ml _______________________________________________ Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net http://www.clamav.net/support/ml