Juniper SSL VPN False Positive

Discussion in 'ESET NOD32 Antivirus' started by SmackyTheFrog, Jul 14, 2009.

Thread Status:
Not open for further replies.
  1. SmackyTheFrog

    SmackyTheFrog Registered Member

    Joined:
    Nov 5, 2007
    Posts:
    767
    Location:
    Lansing, Michigan
    The Win32/Genetik heuristics began detecting our Juniper SSL VPN client for remote access this morning. This is breaking a critical business app, and while I have set up scanning exclusions to prevent any more detections I am unable to remotely manage the quarantine of these systems any my ability to help those that have already been affected is limited.

    A sample has been sent to infected@eset.com with the subject "URGENT FALSE POSITIVE Juniper SSL VPN" at 8:44am EST but if there is anything that can be done to float this one to the top of the queue I would appreciate it.
     
  2. nonoise

    nonoise Registered Member

    Joined:
    Jun 6, 2008
    Posts:
    322
  3. Marcos

    Marcos Eset Staff Account

    Joined:
    Nov 22, 2002
    Posts:
    14,415
    We have actually received it at samples[at]eset.com. It will be fixed in update 4244.
     
  4. SmackyTheFrog

    SmackyTheFrog Registered Member

    Joined:
    Nov 5, 2007
    Posts:
    767
    Location:
    Lansing, Michigan
    Ha, yeah. Way too much going on first thing in the morning.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.