Yes now I did it using IE, before I tried it with Firefox 47 but without 
success, upload procedure never start after choosing of the file to submit! I 
don't know the reason, maybe my proxy that I'm using it!

Regards,
Vahid

-----Original Message-----
From: clamav-users [mailto:clamav-users-boun...@lists.clamav.net] On Behalf Of 
Al Varnell
Sent: lunedì 25 luglio 2016 12:09
To: ClamAV users ML
Subject: Re: [clamav-users] Infor about Xml.Exploit.CVE_2013_3860-1

Because you have not reported it as a False Positive at 
<http://www.clamav.net/reports/fp>

Also see this identical report from yesterday:

<http://lists.clamav.net/pipermail/clamav-users/2016-July/003143.html>

-Al-

On Mon, Jul 25, 2016 at 02:53 AM, Junuzovic Vahid wrote:
> 
> The last night I got the notification:
> --- cut here ---
> /usr/share/doc/libxml2-python-2.7.6/reader2.py: Xml.Exploit.CVE_2013_3860-1 
> FOUND
> 
> ----------- SCAN SUMMARY -----------
> Known viruses: 4667493
> Engine version: 0.99
> Scanned directories: 0
> Scanned files: 1
> Infected files: 1
> Data scanned: 0.01 MB
> Data read: 0.00 MB (ratio 2.00:1)
> Time: 13.372 sec (0 m 13 s)
> 
> I've checked the file and it seems to be original file of the package  
> libxml2-python-2.7.6-21.el6.x86_64.
> I checked it on other server and the timestamp/dimension are the same.
> I checked also it using Kaspersky and it shows that the file is clean.
> 
> What is the reason that ClamAV is reporting it as Exploit? Some error or 
> really exploit detected on this file?

> 
> Junuzovic Vahid
_______________________________________________
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to