VIRUS NAME: Html.Trojan.Iframe-6390207-0
TDB: Engine:51-255,FileSize:16384-65536,Target:3
LOGICAL EXPRESSION: 0
 * SUBSIG ID 0
 +-> OFFSET: ANY
 +-> SIGMOD: NONE
 +-> DECODED SUBSIGNATURE:
><img src="images/pixel_trans.gif" border="0" alt="" width="100%

Question: how is that even something to be 'suspicious' of? There is zero
context around it let alone match on an iframe tag.

Similarly:
VIRUS NAME: Html.Trojan.Hidelink-6390190-0
TDB: Engine:51-255,FileSize:16384-65536,Target:0
LOGICAL EXPRESSION: 0
 * SUBSIG ID 0
 +-> OFFSET: ANY
 +-> SIGMOD: NONE
 +-> DECODED SUBSIGNATURE:
<![CDATA[ */
var dropdown = document.getElementById("cat");
fu

This seems like a common technique for generating dropdown menus for in CMS
applications.

Maarten
_______________________________________________
clamav-users mailing list
clamav-users@lists.clamav.net
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to