On May 8, 2012, at 5:30 AM, Fajar A. Nugraha wrote:

> On Tue, May 8, 2012 at 4:18 PM, Al Varnell <[email protected]> wrote:
>> On 5/8/12 1:42 AM, "Nicole Brown" <[email protected]> wrote:
>> 
>>> We got some reports from our customers said our website reported as Malware
>>> Site by Bitdefender.
>>> Here is the download links of all our products:
>>> http://faxserverplus.com/download/FSPQuick.EXE
>>> http://faxserverplus.com/download/faxserverplusevl.exe
>>> 
>> Why would you be asking clamav-users to check out something BitDefender
>> finds? Shouldn't you be contacting them?
> 
> To be fair, one of the files WAS recognized as malware by clamav :
> https://www.virustotal.com/file/bf5a62810d8ff28129d84c982e80e4a062d33fd1e082483dfc1f56033491f79d/analysis/1336239300/
> 
> So it probably qualifies as FP report. However, since PUA submissions
> are automatically rejected, I'm not sure what the best way to proceed.
> 
> The "our website reported as Malware" part should probably be ignored
> as it's not relevant to this list.

They should check BitDefender. If there is a setting to disable PUA checking, 
then it is a user issue as the user selected to detect PUAs. If there is not a 
selectable option then it should be a bug report to BitDefender. If used in a 
mailserver environment then PUA detects maybe be miss-weighted.

After all PUA is disable by default out of the box by ClamAV so someone else 
must have enabled it. 

Tom
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to