On Sat, Mar 17, 2012 at 11:11:29AM -0700, Jim Preston wrote: > On 03/16/2012 05:31 PM, Tilman Schmidt wrote: > >Am 16.03.2012 13:35, schrieb Andreas Schulze: > >>2. > >>Avira, a german antivirus vendor, may(*) classify the sourcecode tarball as > >>malicious: > >> > >>clamav-0.97.4/test/.split/split.clam-pespin.exeaa<<< PCK/PESpin ; packer ; > >>File has been compressed with an unusual runtime compression tool > >>(PCK/PESpin). Please verify the origin of the file > >IMHO it is only to be expected that virus scanners identify each others' > >test files as malicious. You can hardly blame either side for that. > >After all, both are just doing what they are designed for. > > > >Just ignore it. > > > >Jm2¢ > >Tilman > > > And be glad it is able to detect it :-)
What's the point of detecting a split broken exe? I assume it's not executable in any way? ClamAV could obfuscate those files better in many other ways than splitting anyway.. _______________________________________________ Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net http://www.clamav.net/support/ml
