[clamav-users] Infor about Xml.Exploit.CVE_2013_3860-1

2016-07-25 Thread Junuzovic Vahid
y and it shows that the file is clean. What is the reason that ClamAV is reporting it as Exploit? Some error or really exploit detected on this file? Thanks, Junuzovic Vahid Tel. +39-0125.810759 Mob. +39-335.7598808 ___ Help us build a comprehe

Re: [clamav-users] Infor about Xml.Exploit.CVE_2013_3860-1

2016-07-25 Thread Junuzovic Vahid
ical report from yesterday: <http://lists.clamav.net/pipermail/clamav-users/2016-July/003143.html> -Al- On Mon, Jul 25, 2016 at 02:53 AM, Junuzovic Vahid wrote: > > The last night I got the notification: > --- cut here --- > /usr/share/doc/libxml2-python-2.7.6/reader2.py: Xm

Re: [clamav-users] CVE_2013_3860-1

2016-07-26 Thread Junuzovic Vahid
I checked few minutes ago but it is still present also with the new definitions updated! --- cut here --- # freshclam ClamAV update process started at Tue Jul 26 09:42:49 2016 WARNING: Your ClamAV installation is OUTDATED! WARNING: Local version: 0.99 Recommended version: 0.99.2 DON'T PANIC! Read

Re: [clamav-users] CVE_2013_3860-1

2016-07-26 Thread Junuzovic Vahid
But I'm already running 21972 and the exploit FP is still present! --- cut here --- sigtool -i /var/lib/clamav/daily.cld File: /var/lib/clamav/daily.cld Build time: 26 Jul 2016 02:57 -0400 Version: 21972 Signatures: 454200 Functionality level: 63 Builder: neo Verification OK. --- cut here --- Vah