[clamav-users] False positive on go source code using PUA

2015-11-03 Thread P K
Hi, I tried clamdscan with PUA enabled on go source code and seen an error. Below are error: clamdscan -v go1.4.2.src.tar.gz /home/punit/go1.4.2.src.tar.gz: PUA.File.Exploit.CVE_2012_1461 FOUND --- SCAN SUMMARY --- Infected files: 1 Time: 0.507 sec (0 m 0 s) Is it really infec

Re: [clamav-users] Difficult malwarefiles - signature too short

2015-11-03 Thread Al Varnell
On Tue, Nov 03, 2015 at 10:06 AM, G.W. Haywood wrote: > > Hello again, > > On Tue, 3 Nov 2015, Kris Deugau wrote: > >> Customers will get very unhappy if you blindly delete all PHP files from >> their webhosting account... > > I don't remember suggesting that. > > My point is that ClamAV is d

Re: [clamav-users] Difficult malwarefiles - signature too short

2015-11-03 Thread G.W. Haywood
Hello again, On Tue, 3 Nov 2015, Kris Deugau wrote: Customers will get very unhappy if you blindly delete all PHP files from their webhosting account... I don't remember suggesting that. My point is that ClamAV is designed to look for known threats. The OP is looking for unknown threats. I

Re: [clamav-users] Difficult malwarefiles - signature too short

2015-11-03 Thread Hajo Locke
Hello, Am 02.11.2015 um 19:08 schrieb Kris Deugau: G.W. Haywood wrote: Hi there, On Mon, 2 Nov 2015, Hajo Locke wrote: ... It seems to be so easy for a php-programmer to generate infinite number of malwarefiles ... That's correct. Any .php file sent here goes straight to /dev/null without