I too reported the false positive. I supplied the offending file was that 
correct?

I have 18 other different files that report the same exploit like so -


559 /root$ freshclam
ClamAV update process started at Thu Dec 12 08:54:47 2013
main.cvd is up to date (version: 55, sigs: 2424225, f-level: 60, builder: neo)
daily.cld is up to date (version: 18228, sigs: 599355, f-level: 63, builder: 
neo)
bytecode.cld is up to date (version: 233, sigs: 44, f-level: 63, builder: 
dgoddard)
560 /root$ clamscan /home/alex/pm65dir/nw1706.p65
/home/alex/pm65dir/nw1706.p65: BC.Exploit.CVE_2013_3906 FOUND

----------- SCAN SUMMARY -----------
Known viruses: 3018273
Engine version: 0.98
Scanned directories: 0
Scanned files: 1
Infected files: 1
Data scanned: 5.97 MB
Data read: 3.04 MB (ratio 1.97:1)
Time: 21.518 sec (0 m 21 s)
561 /root$ 


Presumably somewhere in these files there a combination of bytes that match the 
entry in bytecode.cld. My version was downloaded on November 28th. On the 
website it's got a date stamp of 20th November. So I must be using the latest 
version. 

-rw-r--r-- 1 clamav clamav   360960 Nov 28 23:13 bytecode.cld

I can find no reference to BC.Exploit.CVE_2013_3906-3 in any of my files 
downloaded from clamav.


Regards

Alex




On Wednesday 11 Dec 2013 09:56:46 Douglas Goddard wrote:
> When was your last signature update? Could you run freshclam and then
> rescan? That version of the bytecode signature has been dropped and should
> no longer be alerting, the current version is BC.Exploit.CVE_2013_3906-3.
> If that version is still alerting after an update then we will do some
> deeper investigation.
> 
> On Wed, Dec 11, 2013 at 6:12 AM, Al Varnell <alvarn...@mac.com> wrote:
> > On Wed, Dec 11, 2013 at 02:19 AM, Andrew Carter wrote:
> > > I have submitted a file several times (email and Excel attachment) to be
> > 
> > corrected at http://www.clamav.net/lang/en/sendvirus/submit-fp/ however
> > this is still being marked as a virus. In testing it against other
> > scanners
> > Clam is the only one picking it up as a virus.
> > 
> > They will need the MD5 hash value of the file in order to easily find it
> > in their database.
> > 
> > What other scanners did you try? It was apparently reported first by
> > McAfee labs
> > <
> > http://blogs.mcafee.com/mcafee-labs/mcafee-labs-detects-zero-day-exploit-t
> > argeting-microsoft-office-2> 
> > >.
> > 
> > Did you submit it to virustotal.com?
> > 
> > 
> > -Al-
> > --
> > Al Varnell
> > Mountain View, CA
> > 
> > 
> > 
> > 
> > _______________________________________________
> > Help us build a comprehensive ClamAV guide:
> > https://github.com/vrtadmin/clamav-faq
> > http://www.clamav.net/support/ml
> 
> _______________________________________________
> Help us build a comprehensive ClamAV guide:
> https://github.com/vrtadmin/clamav-faq
> http://www.clamav.net/support/ml
_______________________________________________
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq
http://www.clamav.net/support/ml

Reply via email to