[clamav-users] Infor about Xml.Exploit.CVE_2013_3860-1

Junuzovic Vahid vahid.junuzovic at eng.it
Mon Jul 25 09:53:48 UTC 2016


The last night I got the notification:
--- cut here ---
/usr/share/doc/libxml2-python-2.7.6/reader2.py: Xml.Exploit.CVE_2013_3860-1 FOUND

----------- SCAN SUMMARY -----------
Known viruses: 4667493
Engine version: 0.99
Scanned directories: 0
Scanned files: 1
Infected files: 1
Data scanned: 0.01 MB
Data read: 0.00 MB (ratio 2.00:1)
Time: 13.372 sec (0 m 13 s)
--- cut here ---

I've checked the file and it seems to be original file of the package  libxml2-python-2.7.6-21.el6.x86_64.
I checked it on other server and the timestamp/dimension are the same.
I checked also it using Kaspersky and it shows that the file is clean.

What is the reason that ClamAV is reporting it as Exploit? Some error or really exploit detected on this file?


Thanks,



Junuzovic Vahid
Tel. +39-0125.810759
Mob. +39-335.7598808





More information about the clamav-users mailing list