Re: [clamav-users] Txt.Exploit.CVE_2017_0007-5839723-0 FOUND

2017-02-20 Thread Al Varnell
First some background info. The definition was added recently by daily - 23071, Feb 15, 2017, so that explains why you are just now seeing it. It's looking for the following ASCII string in an ASCII Text document: begin_signature

[clamav-users] Txt.Exploit.CVE_2017_0007-5839723-0 FOUND

2017-02-20 Thread Clamise Chee
I am having a lot of thoughts over the detection from the programming packages under "EntityFramework". The alert returns : Txt.Exploit.CVE_2017_0007-5839723-0 FOUND The loads of file (over 100+ per package) was detected as virus with the ID above, there was no mentioning of alerts/scanning

[clamav-users] Clamav and DLP

2017-02-20 Thread Alex
Hi, I'm interested in using clamav on fedora25 for data loss prevention in addition to the virus scanning we're already doing. Is there any documentation on how this all works other than enabling the DLP options in the config file? How do I add my own credit card patterns to be tagged? How about

[clamav-users] clamd onaccess scan and virusEvent

2017-02-20 Thread Jan-Peter Rühmann
Hello I can´t get it to work quite right. If someone could help I would be very thankful. I am working on Kubuntu 16.04 LTS with clamav 0.98.2 clamav-milter is working fine clamav-deamon is runnig (sudo ps-x |grep clamd) clamav-freshclam is working (clamscan -V) shows the actual Virus DB Version.