Can you zip these up, password protect the zip and email them to
v...@sourcefire.com?

Matt

On Tue, Nov 20, 2012 at 4:23 AM, Anssi Johansson <cla...@miuku.net> wrote:
> Hi,
>
> $ clamscan php*.bz2
> php-5.4.0.tar.bz2: PHP.Exploit.CVE_2011_4153-3 FOUND
> php-5.4.1.tar.bz2: PHP.Exploit.CVE_2011_4153-3 FOUND
> php-5.4.3.tar.bz2: PHP.Exploit.CVE_2011_4153-3 FOUND
>
> $ md5sum php*.bz2
> 04bb6f9d71ea86ba05685439d50db074  php-5.4.0.tar.bz2
> 5b9529ed89dbc48c498e9693d1af3caf  php-5.4.1.tar.bz2
> 51f9488bf8682399b802c48656315cac  php-5.4.3.tar.bz2
>
> $ clamscan --version
> ClamAV 0.97.6/15602/Mon Nov 19 23:29:58 2012
>
> I tried submitting these as false positives through the FP reporting page
> some days ago, but the FP submit page said that "This file is not detected
> by ClamAV."
>
> The md5sums of those files match the md5sums published on
> http://php.net/releases/index.php
> _______________________________________________
> Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
> http://www.clamav.net/support/ml
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to