The last night I got the notification: --- cut here --- /usr/share/doc/libxml2-python-2.7.6/reader2.py: Xml.Exploit.CVE_2013_3860-1 FOUND
----------- SCAN SUMMARY ----------- Known viruses: 4667493 Engine version: 0.99 Scanned directories: 0 Scanned files: 1 Infected files: 1 Data scanned: 0.01 MB Data read: 0.00 MB (ratio 2.00:1) Time: 13.372 sec (0 m 13 s) --- cut here --- I've checked the file and it seems to be original file of the package libxml2-python-2.7.6-21.el6.x86_64. I checked it on other server and the timestamp/dimension are the same. I checked also it using Kaspersky and it shows that the file is clean. What is the reason that ClamAV is reporting it as Exploit? Some error or really exploit detected on this file? Thanks, Junuzovic Vahid Tel. +39-0125.810759 Mob. +39-335.7598808 _______________________________________________ Help us build a comprehensive ClamAV guide: https://github.com/vrtadmin/clamav-faq http://www.clamav.net/contact.html#ml