lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <023A8B2E7263454CA0F330E2E9EC2CF20180BCB5@avert-exchange1.na.nai.com>
Date:	Mon, 12 Mar 2007 19:22:12 -0800
From:	Virus Research <Virus_Research@...rtlabs.com>
To:	"'linux-kernel@...r.kernel.org'" <linux-kernel@...r.kernel.org>
Subject: 3280277 - ynlg

AVERT Labs - Beaverton

Current Scan Engine Version:5100.0194

Current DAT Version:4982.0000

Thank you for your submission.


Analysis ID: 3280277

File Name            Findings                       Detection
Type         Extra
--------------------|------------------------------|------------------------
----|------------|-----
virus_research@....c|current detection             |w32/mydoom.o@...zip
|Virus       |no   

current detection [virus_research@....com.zip]


   The file received is infected and can be detected and removed with our
current DAT     
files and engine. It is recommended that you update your DAT and engine
files and scan 
your computer again.


If you are not seeing this with the product you are using, please speak with
technical 
support so that they can help you determine the cause of this discrepancy.


To find detailed information about viruses and other malware, please review
AVERT's    
Virus Information Library:


http://vil.mcafeesecurity.com


In order to get the fastest possible response, you may wish to submit future

virus-samples to:


https://www.webimmune.net/default.asp


In most cases it can respond almost instantly with a solution. This may also
be the    
best option if you are having a problem with gateway scanners stripping your
sample    
submission.


If you believe your computer is infected, but are unsure which files should
be         
submitted to AVERT for review, please visit:


http://vil.mcafeesecurity.com/vil/submit-sample.aspx


For other virus-related information, please review the AVERT homepage at:


http://www.mcafee.com/us/threat_center/default.asp


Support -


Virus Research accepts file-samples for analysis and possible inclusion into
AV        
signature DAT sets. We are also prepared to answer general virus questions.
All        
product-related questions and comments can be addressed through technical
support and  
customer service, including:


* Product installation and update questions

* Product usage questions

* Specific operating system/version questions

* Assistance with detection and cleaning or removal of viruses or trojans


Use the following link to update your DAT and scan engine to the most
current version: 

http://www.mcafee.com/apps/downloads/security_updates/dat.asp


Use the following links to reach online technical support for McAfee
products -        

Corporate Customers:


http://www.mcafeesecurity.com/us/support/


Single User/Retail Customers:


http://www.mcafeehelp.com


Note -


Due to the prevalence of network gateway AV products, it is important that
all         
submissions be zipped and the zip file password-protected (password -
infected). Some  
products will reject an email that contains a virus that is not sent in this
way. In   
addition, often we receive a file that appears not to have been infected, to
find      
later that the file was infected when it left the sender, and was cleaned
somewhere    
along the line.


Regards,




McAfee AVERT tm

A division of McAfee, Inc

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ