[clamav-users] clamav-0.98.3 does not pass vulnerability scan

2014-05-19 Thread anctop
Our system is running Linux with Sendmail-8.14.6. Last week we upgraded ClamAV from 0.98.1 to 0.98.3 without changing the build options : sh ./configure --prefix= --enable-shared --disable-experimental --enable-milter The config files are kept unchanged too. As we perform vulnerability scan

Re: [clamav-users] clamav-0.98.3 does not pass vulnerability scan

2014-05-20 Thread anctop
virus scanner DoS (OID: 1.3.6.1.4.1.25623.1.0.11036) > >On 20.05.14 11:22, anctop wrote: >>But we've verified that ClamAV milter was still running as before. > >The milter only passes data from milter to clamd. You need to look if the >clamd crashed. > >>When using Clam

Re: [clamav-users] clamav-0.98.3 does not pass vulnerability scan

2014-05-22 Thread anctop
I've tried to change the value of "MaxRecursion" in clamd.conf to 4 and 44 respectively, but both experiments yield the same result. Can it be a problem with the MTA ? On 20/05/2014, Matus UHLAR - fantomas wrote: > On 20.05.14 16:22, anctop wrote: >>Both clamav-m

Re: [clamav-users] clamav-0.98.3 does not pass vulnerability scan

2014-05-24 Thread anctop
. On Fri, 23 May 2014, Matus UHLAR - fantomas wrote: On 23.05.14 11:50, anctop wrote: I've tried to change the value of "MaxRecursion" in clamd.conf to 4 and 44 respectively, but both experiments yield the same result. Did you reload/restart clamd afterwards? What was the resu

Re: [clamav-users] clamav-0.98.3 does not pass vulnerability scan

2014-05-24 Thread anctop
t is not possible to do so remotely Vulnerability Detection Method: Details: SMTP antivirus scanner DoS (OID: 1.3.6.1.4.1.25623.1.0.11036) but both clamav-milter and clamd were still working well. On Fri, 23 May 2014, Matus UHLAR - fantomas wrote: On 23.05.14 11:50, anctop wrote: I've t

Re: [clamav-users] clamav-0.98.3 does not pass vulnerability scan

2014-05-26 Thread anctop
I've synchronized all the feeds (NVT, SCAP, CERT) to ensure that the scan conditions are identical. Firstly, with clamav-0.98.3, the same "high threat" was reported : > NVT:SMTP antivirus scanner DoS > OID:1.3.6.1.4.1.25623.1.0.11036 > Threat: High (CVSS: 7.2) > Port: smtp (25/tcp) > >

[clamav-users] how to build release 0.104.1 in non-standard systems

2021-11-04 Thread anctop--- via clamav-users
Hi, We are using ClamAV on our server for protection against virus. However, the build method (using "cmake") for the new 0.104.1 release has prevented us from upgrading promptly as before. Our system is running "Linux From Scratch", in which most software packages are installed in non-stan

Re: [clamav-users] how to build release 0.104.1 in non-standard systems

2021-11-05 Thread anctop--- via clamav-users
Thank you very much for your advice. We have successfully built ClamAV 0.103.4 and have it working. On Fri, 5 Nov 2021, Andrew C Aitchison wrote: On Fri, 5 Nov 2021, anctop--- via clamav-users wrote: We are using ClamAV on our server for protection against virus. However, the build

[clamav-users] "BZIP2_LIBRARIES" breaks cmake build

2022-01-15 Thread anctop--- via clamav-users
Hi, I am writing to report that the cmake build method will be broken if the "BZIP2_LIBRARIES" parameter is set. The build is successful with this : | cmake .. \ | -D CMAKE_BUILD_TYPE=Release \ | -D ENABLE_JSON_SHARED=OFF \ | -D JSONC_INCLUDE_DIR=/include/json-c \ | -D JSONC_LIBRARY=/lib

Re: [clamav-users] "BZIP2_LIBRARIES" breaks cmake build

2022-01-18 Thread anctop via clamav-users
This is to confirm that the fix works perfectly. Many thanks for your help. It is particularly crucial for those non-standard systems like ours. Regards, anctop On Tue, 18 Jan 2022, Micah Snyder (micasnyd) wrote: We use CMake's FindBZip2 module. It looks to me like there are two issue