> -----Original Message-----
> From: Ken Jones [mailto:[EMAIL PROTECTED]
> Subject: Re: [Clamav-users] Clamav and the CR Vulnerability
>
>
> I sent it to my server as well, and it was caught. Clamav 80.
Did you just do this? I tried looking at the source of the email I received and I
don't see an eicar test signature anywhere... Where would this be located in the raw
email source?
> What os are you using, how did you get / build / install clam ?
RHES 3.0, ClamAV 0.80, Simscan (latest CVS)...
I download the .tar.gz file from the clamav website and roll it into an RPM.
Specifically, the configure line looks like this (copied from config.log):
./configure --host=i686-redhat-linux-gnu \
--build=i686-redhat-linux-gnu \
--target=i386-redhat-linux \
--program-prefix= \
--prefix=/usr \
--exec-prefix=/usr \
--bindir=/usr/bin \
--sbindir=/usr/sbin \
--sysconfdir=/etc \
--datadir=/usr/share \
--includedir=/usr/include \
--libdir=/usr/lib \
--libexecdir=/usr/libexec \
--localstatedir=/var \
--sharedstatedir=/usr/com \
--mandir=/usr/share/man \
--infodir=/usr/share/info \
--program-prefix= \
--disable-clamav \
--enable-id-check \
--with-tcpwrappers \
--with-user=clamav \
--with-group=clamav \
--with-dbdir=/var/lib/clamav
> --
> Ken Jones
> [EMAIL PROTECTED]
--
Jason Frisvold
Penteledata
_______________________________________________
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users