Vous n'êtes pas identifié(e).
9 virus potentiel(s) trouvé(s) menaces (58856 fichiers analysés).
/home/alain/.local/share/Trash/files/B16092102035.pdf Heuristics.Encrypted.PDF
/home/alain/.cache/mozilla/firefox/satzgj9s.default/cache2/entries/6801A0AEECCFC03E56BEFFB6EE16782911C8F188 PUA.Win.Trojan.Xored-1
/home/alain/.cache/mozilla/firefox/satzgj9s.default/cache2/entries/EB7EA188FCE1D75D170202D6D3E9FAD3B4698E90 PUA.Html.Exploit.CVE_2015_1692-1
/home/alain/.cache/mozilla/firefox/satzgj9s.default/cache2/entries/61C06CD1619E482E865AE52693BA20C51C1DFF47 PUA.Win.Trojan.Xored-1
/home/alain/.cache/mozilla/firefox/satzgj9s.default/OfflineCache/1/2/74594A06ACE00E-0 PUA.Win.Trojan.Xored-1
/home/alain/.cache/mozilla/firefox/satzgj9s.default/OfflineCache/F/1/2F60C694EA4629-0 PUA.Win.Trojan.Xored-1
/home/alain/.config/libreoffice/4/user/basic/Standard/Module1.xba PUA.Doc.Tool.LibreOfficeMacro-1
/home/alain/.config/google-chrome/Default/Application Cache/Cache/f_0006b0 PUA.Html.Trojan.Agent-37075
/home/alain/.config/google-chrome/Default/Application Cache/Cache/f_000776 PUA.Html.Trojan.Agent-37075
question : comment supprimer ces menaces ?
est ce que je dois les effacer purement et simplement ? est ce sans risque ?
comment faire ?
merci
Hors ligne
1 virus potentiel(s) trouvé(s) menace (61069 fichiers analysés).
/home/alain/.config/libreoffice/4/user/basic/Standard/Module1.xba PUA.Doc.Tool.LibreOfficeMacro-1
j'ai trouvé ça mais je comprends pas très bien :
http://www.debugpoint.com/2016/03/libre … nization/#
le fichier en question regroupe toutes les macros ou seulement les nouvelles créé par l'utilisateur ?
apparemment , seulement les nouvelles , je vais donc l'effacer
Dernière modification par debian-alain (26-11-2016 17:58:32)
Hors ligne
What is PUA? I get a lot of false positives named PUA.
With the release of ClamAV 0.91.2 we introduce the option to scan for Potentially Unwanted Applications.
The PUA database contains detection for applications that are not malicious by itself but can be used in a malicious or unwanted context. As an example: A tool to retrieve passwords from a system can be useful as long as the person who uses it, is authorized to do so. However, the same tool can be used to steal passwords from a system. To make use of the PUA database you can use the --detect-pua switch for clamscan or enable it in the config file for clamd (add: DetectPUA yes).
At this point we DO NOT recommend using it in production environments, because the detection may be too aggressive and lead to false positives. In one of the next releases we will provide additional features for fine-tuning allowing better adjustments to different setups. NOTE: A detection as PUA does NOT tell if an application is good or bad. All it says is, that a file MAY BE unwanted or MAYBE could compromise your system security and it MAY BE a good idea to check it twice.
Source : Miscellaneous FAQ (CC By-ND 2.5)
Dernière modification par èfpé (27-11-2016 15:26:32)
Hors ligne