Hello,

Thank you..

I agree with you and also aware about it as old vulnerability and to use of
latest/patched software.

However, my intention was to detect it before it get deliver to user.
Especially when other AV could detect it and block it.

I will wait for response from clamav team.

With Regards
Jigar


On Sat, Apr 3, 2021, 22:26 G.W. Haywood via clamav-users <
clamav-users@lists.clamav.net> wrote:

> Hi there,
>
> On Sat, 3 Apr 2021, Jigar via clamav-users wrote:
>
> > Any update w.r.t. submitted infected file and signature?.
>
> This vulnerability was patched by Microsoft more than three years ago.
>
> For example, see
>
> https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2017-11882
>
> There should be no vulnerable versions of the software running now.
>
> As this is such an old threat, and mitigated a long time ago, you seem
> to me to be more concerned about it than I would expect anyone to be.
>
> Is there any particular reason for that?
>
> If you supplied your email address to the ClamAV signature team when
> you reported the malware samples you will get an email in due course
> if a new signature is developed.  OTOH I should not expect them to be
> putting this one at the front of their schedule.
>
> If you are using vulnerable software, patch it.
>
> --
>
> 73,
> Ged.
>
> _______________________________________________
>
> clamav-users mailing list
> clamav-users@lists.clamav.net
> https://lists.clamav.net/mailman/listinfo/clamav-users
>
>
> Help us build a comprehensive ClamAV guide:
> https://github.com/vrtadmin/clamav-faq
>
> http://www.clamav.net/contact.html#ml
>
_______________________________________________

clamav-users mailing list
clamav-users@lists.clamav.net
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to