[clamav-users] Infor about Xml.Exploit.CVE_2013_3860-1
Junuzovic Vahid
vahid.junuzovic at eng.it
Mon Jul 25 09:53:48 UTC 2016
The last night I got the notification:
--- cut here ---
/usr/share/doc/libxml2-python-2.7.6/reader2.py: Xml.Exploit.CVE_2013_3860-1 FOUND
----------- SCAN SUMMARY -----------
Known viruses: 4667493
Engine version: 0.99
Scanned directories: 0
Scanned files: 1
Infected files: 1
Data scanned: 0.01 MB
Data read: 0.00 MB (ratio 2.00:1)
Time: 13.372 sec (0 m 13 s)
--- cut here ---
I've checked the file and it seems to be original file of the package libxml2-python-2.7.6-21.el6.x86_64.
I checked it on other server and the timestamp/dimension are the same.
I checked also it using Kaspersky and it shows that the file is clean.
What is the reason that ClamAV is reporting it as Exploit? Some error or really exploit detected on this file?
Thanks,
Junuzovic Vahid
Tel. +39-0125.810759
Mob. +39-335.7598808
More information about the clamav-users
mailing list