Hi,
Looks like a problem with RAV, not with QS.
A test of the exact same thing here, without the RAV, gets processed and
delivered without problem. You may want to check on the RAV support board.
qmail-scanner 1.16
clamav-20030403
qmail 1.03
Regards
Rick
Payal Rathod wrote:
Hi,
I have insta
sorry for top-posting
This problem is due to RAV outputing multiple lines with the string
"Infected:"
example RAV output:
/path/->(part0001:)->(IFRAME) Infected: HTML/IFrame_Exploit*
/path/->(part0002:Foo.DOC.pif) Infected: Win32/[EMAIL PROTECTED]
/path/->(part0001:Foo.doc.lnk) Infect
Hi,
I have installed,
qmail-scanner 1.16
RAV 8.3.1
clamscan 0.60
qmail 1.03
Now qmail-scanner is giving false alarms over simple sessions like
this.
[EMAIL PROTECTED] root]# telnet 127.0.0.1 25
Trying 127.0.0.1...
Connected to linux (127.0.0.1).
Escape character is '^]'.
220 linux.local ESMTP
mai
Greetz,
I keep getting the most annoying emails sent daily that contain Klez.
Here is the information that qmail-scanner reports:
Your message was sent with the following envelope:
MAIL FROM: [EMAIL PROTECTED]
RCPT TO: [EMAIL PRO
FYI to all
since Q-S does unzipping, you might be interested in obtaining updated
unzip package.
Ref:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0282
RedHat'ers can find updated pkg at-
http://rhn.redhat.com/errata/RHSA-2003-199.html
excerpt
"Directory traversal vulnerability in U
Hi all,
I have a RH9 with qmail installed and working. I
installed qmail-scanner 1.16 and sophos antivirus, all seems to work, except
that any message is stopped.
Im working with virtual domains...maybe here is the
problem...
Any idea??
This is one example of the qmail-quee.log generated