[clamav-users] CVE_2013_3860-1
Joel Esler (jesler)
jesler at cisco.com
Wed Jul 27 02:27:08 UTC 2016
It may take more than one publish cycle to drop a sig. Publish cycles are at least every four hours.
--
Joel Esler
iPhone
On Jul 26, 2016, at 10:16 PM, Al Varnell <alvarnell at mac.com<mailto:alvarnell at mac.com>> wrote:
Appears to be finally gone at this time.
<http://clamav-du.securesites.net/cgi-bin/clamgrok?virus=Xml.Exploit.CVE_2013_3860-1&search-type=contains&case-sensitivity=No&database=daily&database=main&display=database&display=virus&display=signature&.submit=Submit&.cgifields=database&.cgifields=search-type&.cgifields=case-sensitivity&.cgifields=display>
-Al=
On Tue, Jul 26, 2016 at 01:46 AM, Al Varnell wrote:
I know, that's what I said. It has not been dropped.
-Al-
On Tue, Jul 26, 2016 at 01:32 AM, Junuzovic Vahid wrote:
But I'm already running 21972 and the exploit FP is still present!
--- cut here ---
sigtool -i /var/lib/clamav/daily.cld
File: /var/lib/clamav/daily.cld
Build time: 26 Jul 2016 02:57 -0400
Version: 21972
Signatures: 454200
Functionality level: 63
Builder: neo
Verification OK.
--- cut here ---
Vahid
_______________________________________________
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq
http://www.clamav.net/contact.html#ml
More information about the clamav-users
mailing list