On Fri, Feb 10, 2012 at 01:53:26PM +0200, Henri Salo wrote:
> I just reported sample as false-positive, which is detected as
> Exploit.MS04_028-4. This picture is generated by web-camera with SHA1
> d7ad16339fbf5d2b193bb4df7299c6f3da20c0b8 and I do have another file, which
> were detected with s
On 03/16/2012 01:36 AM, Sergio wrote:
> Ok, sorry for the missing information, my server is RHEL 6, 64 bits with
> WHM/CPanel 11.30.6.
>
> I will force update again CLAMAV and see if I can get more info about the
> missing libraries and I post it here.
>
> Thanks for your help.
Might want to try
Hi,
Any eta on an update to v0.97.4 here...
http://sourceforge.net/projects/clamav/files/clamav/win32/
Cheers,
Steve
Sanesecurity
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml
Hello,
1.
I just compiled the new version in my autobuild system for
multiple version of SuSE Linux Enterprise Servers.
I noticed this RPMLINT report which I like to forward to you for inforamation:
RPMLINT report:
===
clamav.i586: W: shared-lib-calls-exit /usr/lib/libclamav.so.6.1.1
On 03/16/12 10:54, Steve Basford wrote:
> Hi,
>
> Any eta on an update to v0.97.4 here...
>
> http://sourceforge.net/projects/clamav/files/clamav/win32/
I'm building them right now, so probably your late afternoon.
BTW, please don't hijack other threads...
-- aCaB
_
On 03/16/2012 02:35 PM, Andreas Schulze wrote:
> Hello,
>
> 1.
> I just compiled the new version in my autobuild system for
> multiple version of SuSE Linux Enterprise Servers.
>
> I noticed this RPMLINT report which I like to forward to you for inforamation:
>
> RPMLINT report:
> ==
Am 16.03.2012 13:35, schrieb Andreas Schulze:
> 2.
> Avira, a german antivirus vendor, may(*) classify the sourcecode tarball as
> malicious:
>
> clamav-0.97.4/test/.split/split.clam-pespin.exeaa <<< PCK/PESpin ; packer ;
> File has been compressed with an unusual runtime compression tool
> (PC