Yes. After each modification, I ran "killall -HUP -e clamd" to restart clamd.

The scan report reads :

NVT:    SMTP antivirus scanner DoS
OID:    1.3.6.1.4.1.25623.1.0.11036
Threat: High (CVSS: 7.2)
Port:   smtp (25/tcp)
        submission (587/tcp)

The file 42.zip was sent 2 times. If there is an antivirus in your MTA, it
might have crashed. Please check its status right now, as it is
not possible to do so remotely

Vulnerability Detection Method:
Details:
SMTP antivirus scanner DoS
(OID: 1.3.6.1.4.1.25623.1.0.11036)

but both clamav-milter and clamd were still working well.


On Fri, 23 May 2014, Matus UHLAR - fantomas wrote:

On 23.05.14 11:50, anctop wrote:
I've tried to change the value of "MaxRecursion" in clamd.conf to 4
and 44 respectively, but both experiments yield the same result.

Did you reload/restart clamd afterwards? What was the result?

Can it be a problem with the MTA ?

I can't tell you without the information above
--
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
Spam = (S)tupid (P)eople's (A)dvertising (M)ethod
_______________________________________________
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq
http://www.clamav.net/support/ml

Reply via email to