Thank you for reporting the FP and providing information. The signature
needs to be reworked as it is causing FPs. The current version of the
signature will be dropped shortly.

Thanks,

- Alain

On Fri, Aug 21, 2015 at 1:56 PM, Ángel González <an...@av.16bits.net> wrote:

> Al Varnell wrote:
> > I’ve had three users report browser cache files indicating
> > Swf.Exploit.CVE_2015_3102 infection.  All were logging into PayPal at
> > the time.
> > <https://www.paypal.com/us/cgi-bin/webscr?cmd=_account>
>
> My first doubt was wether they were logging into the legitimate PayPal
> site, but apparently they were.
>
> The Swf.Exploit.CVE_2015_3102 signature matches the file at
>  hxxps://www.paypal.com/en_US/m/mid.swf
>
>
> PayPal seems to have modified the file in the meantime, though. Al
> reported the file was 5d024cc615e2b1c35ce9b2cce77ef481 /
> c9d1856cfddc24fc3c51e5cc023c2cb4575b38a2140a39123438276d18b8561e
> The one I downloaded is b0a5b791ee0a61b5bab74c8772e227e0 /
>  75c2934018c742de4c902ad377be8edb7473266bacbb20e6407368676b9330a9
> _______________________________________________
> Help us build a comprehensive ClamAV guide:
> https://github.com/vrtadmin/clamav-faq
>
> http://www.clamav.net/contact.html#ml
>
_______________________________________________
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to