Re: [clamav-users] Reddit fp report

2016-11-29 Thread Al Varnell
FYI, the file in question can be downloaded from and is a match to Win.Worm.GenericAgent-178 bbd976df79ca25bb475d4f5cdf206b81:821491 added to ClamAV in daily - 22120 on or about 21 Aug 2016. OP Contact appears to be bdargosoftw...@gmail.com -Al- On Tue, Nov

Re: [clamav-users] FP Pdf.Exploit.CVE_2016_1091-2

2016-11-29 Thread Gene Heskett
On Tuesday 29 November 2016 11:53:03 Jeff Dyke wrote: > Is there any way to get updates on a false positives(i submitted this > about a week or so ago), if it is or is not, i still find these. In my > case they seem to be ok coming from the printer, but then a > non-technical person opens and

[clamav-users] BKF archives scanable by ClamAV?

2016-11-29 Thread Fr34k
Hello ClamAV Experts, Can ClamAV scan within Windows BKF archives? Both the Clam AntiVirus 0.99.1User Manual and my Internet searches thus far suggest the answer is, sadly, "no".I presume this may be due to the age of .bkf usage.  Regardless, I was hoping for a definitive answer from the

Re: [clamav-users] Reddit fp report

2016-11-29 Thread Al Varnell
Appears to have been taken care of in daily - 22628 > ClamAV Signature Publishing Notice > > Datefile: daily > Version:22628 > Publisher: Alain Zidouemba > New Sigs: 0 > Dropped Sigs: 8 > Ignored Sigs: 55 > > > New Detection Signatures: > > > > Dropped Detection

Re: [clamav-users] FP Pdf.Exploit.CVE_2016_1091-2

2016-11-29 Thread Jeff Dyke
Is there any way to get updates on a false positives(i submitted this about a week or so ago), if it is or is not, i still find these. In my case they seem to be ok coming from the printer, but then a non-technical person opens and saves the file with a different name (rather than just rename it)

[clamav-users] Reddit fp report

2016-11-29 Thread Steve basford
Might need a reply https://www.reddit.com/r/Malware/comments/5fix65/clamav_and_fortinet_have_not_fixed_a_false/ https://www.virustotal.com/en/file/61b5451350a110512d734f426a37e49721a7dea8170fd10f0a48974dedd971a5/analysis/ Cheers, Steve Twitter: @sanesecurity