On Sat, Mar 17, 2012 at 11:11:29AM -0700, Jim Preston wrote:
> On 03/16/2012 05:31 PM, Tilman Schmidt wrote:
> >Am 16.03.2012 13:35, schrieb Andreas Schulze:
> >>2.
> >>Avira, a german antivirus vendor, may(*) classify the sourcecode tarball as 
> >>malicious:
> >>
> >>clamav-0.97.4/test/.split/split.clam-pespin.exeaa<<<  PCK/PESpin ; packer ; 
> >>File has been compressed with an unusual runtime compression tool 
> >>(PCK/PESpin). Please verify the origin of the file
> >IMHO it is only to be expected that virus scanners identify each others'
> >test files as malicious. You can hardly blame either side for that.
> >After all, both are just doing what they are designed for.
> >
> >Just ignore it.
> >
> >Jm2¢
> >Tilman
> >
> And be glad it is able to detect it :-)

What's the point of detecting a split broken exe? I assume it's not
executable in any way?

ClamAV could obfuscate those files better in many other ways than splitting
anyway..
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to