Re: Bloodhound.Exploit.49 trojan found in MIMEBase.pyc

2005-10-18 Thread Fredrik Lundh
Alex Hunsley wrote:

 Symantec antivirus has apparently picked up a virus in my Python 2.4
 (under cygwin):

 Scan type:  Scheduled Scan
 Event:  Threat Found!
 Threat: Bloodhound.Exploit.49
 File:  C:\cygwin\lib\python2.4\email\MIMEBase.pyc
 Location:  Quarantine
 Action taken:  Quarantine succeeded

 There's info to be found on various pages, but it's a pretty terse
 explanation:
 http://secunia.com/virus_information/22534/bloodhound.exploit.49/

 Has anyone had this also? Is it perhaps a false positive?

if Python had anything to do with this, they would probably have mentioned it
in the related documents:

http://www.sarc.com/avcenter/venc/data/bloodhound.exploit.49.html
http://www.microsoft.com/technet/security/bulletin/MS05-048.mspx

/F 



-- 
http://mail.python.org/mailman/listinfo/python-list


Re: Bloodhound.Exploit.49 trojan found in MIMEBase.pyc

2005-10-18 Thread jepler
It's almost certainly a false positive.  In my day job we run into false
positive antivirus detections like this once or twice a year, and
typically get a runaround from the AV vendor (who often have the gall to
suggest that we should buy a copy of their broken software before
they'll fix their problems)

Jeff


pgpjaq8H7Vm4a.pgp
Description: PGP signature
-- 
http://mail.python.org/mailman/listinfo/python-list