[clamav-users] Infor about Xml.Exploit.CVE_2013_3860-1
Al Varnell
alvarnell at mac.com
Mon Jul 25 10:08:25 UTC 2016
Because you have not reported it as a False Positive at <http://www.clamav.net/reports/fp>
Also see this identical report from yesterday:
<http://lists.clamav.net/pipermail/clamav-users/2016-July/003143.html>
-Al-
On Mon, Jul 25, 2016 at 02:53 AM, Junuzovic Vahid wrote:
>
> The last night I got the notification:
> --- cut here ---
> /usr/share/doc/libxml2-python-2.7.6/reader2.py: Xml.Exploit.CVE_2013_3860-1 FOUND
>
> ----------- SCAN SUMMARY -----------
> Known viruses: 4667493
> Engine version: 0.99
> Scanned directories: 0
> Scanned files: 1
> Infected files: 1
> Data scanned: 0.01 MB
> Data read: 0.00 MB (ratio 2.00:1)
> Time: 13.372 sec (0 m 13 s)
>
> I've checked the file and it seems to be original file of the package libxml2-python-2.7.6-21.el6.x86_64.
> I checked it on other server and the timestamp/dimension are the same.
> I checked also it using Kaspersky and it shows that the file is clean.
>
> What is the reason that ClamAV is reporting it as Exploit? Some error or really exploit detected on this file?
>
> Junuzovic Vahid
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 3573 bytes
Desc: not available
URL: <https://lists.clamav.net/pipermail/clamav-users/attachments/20160725/2197f5a1/attachment.bin>
More information about the clamav-users
mailing list