Thanks for reporting this FP Maarten. We are in the process of fixing this
and will replace this signature.

- Alain

On Wed, Dec 6, 2017 at 11:54 AM, Maarten Broekman <
maarten.broek...@gmail.com> wrote:

> VIRUS NAME: Html.Trojan.Iframe-6390207-0
> TDB: Engine:51-255,FileSize:16384-65536,Target:3
> LOGICAL EXPRESSION: 0
>  * SUBSIG ID 0
>  +-> OFFSET: ANY
>  +-> SIGMOD: NONE
>  +-> DECODED SUBSIGNATURE:
> ><img src="images/pixel_trans.gif" border="0" alt="" width="100%
>
> Question: how is that even something to be 'suspicious' of? There is zero
> context around it let alone match on an iframe tag.
>
> Similarly:
> VIRUS NAME: Html.Trojan.Hidelink-6390190-0
> TDB: Engine:51-255,FileSize:16384-65536,Target:0
> LOGICAL EXPRESSION: 0
>  * SUBSIG ID 0
>  +-> OFFSET: ANY
>  +-> SIGMOD: NONE
>  +-> DECODED SUBSIGNATURE:
> <![CDATA[ */
> var dropdown = document.getElementById("cat");
> fu
>
> This seems like a common technique for generating dropdown menus for in CMS
> applications.
>
> Maarten
> _______________________________________________
> clamav-users mailing list
> clamav-users@lists.clamav.net
> http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users
>
>
> Help us build a comprehensive ClamAV guide:
> https://github.com/vrtadmin/clamav-faq
>
> http://www.clamav.net/contact.html#ml
>
_______________________________________________
clamav-users mailing list
clamav-users@lists.clamav.net
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to