A ClamXav user complained of having a Google Chrome extension “WebGL Inspector” 
which he has used since 2012 was said to be infected with HTML.Exploit.Heap-2.

I was able to obtain a later version of that extension and verified that the 
gli.all.js file in that extension scans as infected.

I was not able to locate when this signature was added on the clamav-virusdb 
list.

I was able to easily confirm that the file contains all elements of the 
signature (four ascii strings separated by “any strings” of varying length.

I haven’t found any clues on what an actual infected file might be.

I submitted it to VirusTotal where only ClamAV® detected it
<https://www.virustotal.com/en/file/36fd57cce150c5e8ea26168823e84b19e109592c6586496b605306cbb482d982/analysis/1399908003/>

I successfully uploaded to you using your "Submit a false positive" form.  MD5 
= 6968c0d2ad15e68b33bb30074ddbb7a6


-Al-
-- 
Al Varnell
Mountain View, CA




_______________________________________________
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq
http://www.clamav.net/support/ml

Reply via email to