Thanks, Al. I'll have to add those to the FP database.
On Wed, Apr 22, 2015 at 2:24 AM, Al Varnell <alvarn...@mac.com> wrote: > It would appear this has now been taken care of with ClamAV database > updated (22 Apr 2015 01-07 -0400): daily.cvd > Version: 20358. > > -Al- > On Tue, Apr 21, 2015 at 08:52 PM, Al Varnell wrote: > > > > Just a heads up that I’ve gotten two reports of > Xml.Exploit.CVE_2013_3860-1 infected files being found in OS X Commercial > Software. > > > > The first involved a couple of files internal to Mono software < > http://www.mono-project.com>. I suggested the user contact Mono, but > since I got a second report decided to upload them to you myself: > > > > autoidx.xsl = 9b6b0ee23ee50b72a80c9bebe32b0320 > > autoidx.xsl = 757b85185542373bab50439ff31844d1 > > > > The second was received late today and implicated the latest Apple > Server.app 4.1. I need to wait until tomorrow to find out exactly what > file is involved in that one and attempt to have the user upload it. > > > > > > -Al- > _______________________________________________ > Help us build a comprehensive ClamAV guide: > https://github.com/vrtadmin/clamav-faq > > http://www.clamav.net/contact.html#ml > _______________________________________________ Help us build a comprehensive ClamAV guide: https://github.com/vrtadmin/clamav-faq http://www.clamav.net/contact.html#ml