Thanks, Al.

I'll have to add those to the FP database.

On Wed, Apr 22, 2015 at 2:24 AM, Al Varnell <alvarn...@mac.com> wrote:

> It would appear this has now been taken care of with ClamAV database
> updated (22 Apr 2015 01-07 -0400): daily.cvd
> Version: 20358.
>
> -Al-
> On Tue, Apr 21, 2015 at 08:52 PM, Al Varnell wrote:
> >
> > Just a heads up that I’ve gotten two reports of
> Xml.Exploit.CVE_2013_3860-1 infected files being found in OS X Commercial
> Software.
> >
> > The first involved a couple of files internal to Mono software <
> http://www.mono-project.com>.  I suggested the user contact Mono, but
> since I got a second report decided to upload them to you myself:
> >
> > autoidx.xsl = 9b6b0ee23ee50b72a80c9bebe32b0320
> > autoidx.xsl = 757b85185542373bab50439ff31844d1
> >
> > The second was received late today and implicated the latest Apple
> Server.app 4.1.  I need to wait until tomorrow to find out exactly what
> file is involved in that one and attempt to have the user upload it.
> >
> >
> > -Al-
> _______________________________________________
> Help us build a comprehensive ClamAV guide:
> https://github.com/vrtadmin/clamav-faq
>
> http://www.clamav.net/contact.html#ml
>
_______________________________________________
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to