The FP reporting form at https://www.clamav.net/reports/fp seems not
to be working in my browser, but I found a false positive that is easy
to reproduce. In a linux system zip file produced by these following
commands triggers Email.Phishing.VOF1-6313981-0:

dd if=/dev/urandom of=fubar.txt bs=1k count=10
zip -m test.docx fubar.txt 
zip -m test test.docx 

Now when you send the test.zip as an email attachment it triggers
Email.Phishing.VOF1-6313981-0.
-- 
Pertti Karppinen
Suora puhelinnumero 014 445 5105
Sähköposti pertti.karppi...@online.fi

Online Solutions Oy - http://www.online.fi/
Puhelinvaihde 014 445 5100, Telekopio 014 445 5101

Tutustu SecMail -sähköpostiturvapalveluumme: http://www.secmail.com/

_______________________________________________
clamav-users mailing list
clamav-users@lists.clamav.net
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to