Well yeah, it seems "Bloodhound.Exploit.59" is billed as a 'heuristic detection for Windows Media Player vulnerabilty" ... so its not a case of a known virus signature, but some 'smart' symantec heuristic that is going overboard. Someone should probably notify Symantec.. .
Clamav, not being so intelligent, does not have any issues with the files. Regards - Avik On Wednesday 24 January 2007 16:35, Nick Burch wrote: > On Wed, 24 Jan 2007, A. Rick Anderson wrote: > > When I download the POI source code, my Symantec virus checker goes > > nuts. It reports that, at least one, of the image files contains the > > Bloodhound.Exploit.59 virus. The latest report was for the file > > sci_cec.dib. The reported images are usually in scratchpad testcases. > > This has been true for the last couple of alpha releases. > > You need to shout a Symantec, and tell them to fix their broken virus > checker. > > sci_cec.dib is a 94 byte data file use for testing hslf's image handling. > It's really not a virus. A few of the other test hslf files include the > same data in them. They aren't viruses either. > > Nick > > --------------------------------------------------------------------- > To unsubscribe, e-mail: [EMAIL PROTECTED] > Mailing List: http://jakarta.apache.org/site/mail2.html#poi > The Apache Jakarta Poi Project: http://jakarta.apache.org/poi/ --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] Mailing List: http://jakarta.apache.org/site/mail2.html#poi The Apache Jakarta Poi Project: http://jakarta.apache.org/poi/
