[clamav-users] signature for cve2017-11882
Jigar
ojigar at gmail.com
Sun Apr 4 02:24:00 UTC 2021
Hello,
Thank you..
I agree with you and also aware about it as old vulnerability and to use of
latest/patched software.
However, my intention was to detect it before it get deliver to user.
Especially when other AV could detect it and block it.
I will wait for response from clamav team.
With Regards
Jigar
On Sat, Apr 3, 2021, 22:26 G.W. Haywood via clamav-users <
clamav-users at lists.clamav.net> wrote:
> Hi there,
>
> On Sat, 3 Apr 2021, Jigar via clamav-users wrote:
>
> > Any update w.r.t. submitted infected file and signature?.
>
> This vulnerability was patched by Microsoft more than three years ago.
>
> For example, see
>
> https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2017-11882
>
> There should be no vulnerable versions of the software running now.
>
> As this is such an old threat, and mitigated a long time ago, you seem
> to me to be more concerned about it than I would expect anyone to be.
>
> Is there any particular reason for that?
>
> If you supplied your email address to the ClamAV signature team when
> you reported the malware samples you will get an email in due course
> if a new signature is developed. OTOH I should not expect them to be
> putting this one at the front of their schedule.
>
> If you are using vulnerable software, patch it.
>
> --
>
> 73,
> Ged.
>
> _______________________________________________
>
> clamav-users mailing list
> clamav-users at lists.clamav.net
> https://lists.clamav.net/mailman/listinfo/clamav-users
>
>
> Help us build a comprehensive ClamAV guide:
> https://github.com/vrtadmin/clamav-faq
>
> http://www.clamav.net/contact.html#ml
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.clamav.net/pipermail/clamav-users/attachments/20210404/4e97121d/attachment.htm>
More information about the clamav-users
mailing list