On May 8, 2012, at 5:30 AM, Fajar A. Nugraha wrote: > On Tue, May 8, 2012 at 4:18 PM, Al Varnell <[email protected]> wrote: >> On 5/8/12 1:42 AM, "Nicole Brown" <[email protected]> wrote: >> >>> We got some reports from our customers said our website reported as Malware >>> Site by Bitdefender. >>> Here is the download links of all our products: >>> http://faxserverplus.com/download/FSPQuick.EXE >>> http://faxserverplus.com/download/faxserverplusevl.exe >>> >> Why would you be asking clamav-users to check out something BitDefender >> finds? Shouldn't you be contacting them? > > To be fair, one of the files WAS recognized as malware by clamav : > https://www.virustotal.com/file/bf5a62810d8ff28129d84c982e80e4a062d33fd1e082483dfc1f56033491f79d/analysis/1336239300/ > > So it probably qualifies as FP report. However, since PUA submissions > are automatically rejected, I'm not sure what the best way to proceed. > > The "our website reported as Malware" part should probably be ignored > as it's not relevant to this list.
They should check BitDefender. If there is a setting to disable PUA checking, then it is a user issue as the user selected to detect PUAs. If there is not a selectable option then it should be a bug report to BitDefender. If used in a mailserver environment then PUA detects maybe be miss-weighted. After all PUA is disable by default out of the box by ClamAV so someone else must have enabled it. Tom _______________________________________________ Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net http://www.clamav.net/support/ml
