Juniper SSL VPN False Positive

Discussion in 'ESET NOD32 Antivirus' started by SmackyTheFrog, Jul 14, 2009.

Thread Status:
Not open for further replies.
  1. SmackyTheFrog

    SmackyTheFrog Registered Member

    Joined:
    Nov 5, 2007
    Posts:
    767
    Location:
    Lansing, Michigan
    The Win32/Genetik heuristics began detecting our Juniper SSL VPN client for remote access this morning. This is breaking a critical business app, and while I have set up scanning exclusions to prevent any more detections I am unable to remotely manage the quarantine of these systems any my ability to help those that have already been affected is limited.

    A sample has been sent to infected@eset.com with the subject "URGENT FALSE POSITIVE Juniper SSL VPN" at 8:44am EST but if there is anything that can be done to float this one to the top of the queue I would appreciate it.
     
  2. nonoise

    nonoise Registered Member

    Joined:
    Jun 6, 2008
    Posts:
    322
  3. Marcos

    Marcos Eset Staff Account

    Joined:
    Nov 22, 2002
    Posts:
    14,374
    We have actually received it at samples[at]eset.com. It will be fixed in update 4244.
     
  4. SmackyTheFrog

    SmackyTheFrog Registered Member

    Joined:
    Nov 5, 2007
    Posts:
    767
    Location:
    Lansing, Michigan
    Ha, yeah. Way too much going on first thing in the morning.
     
Thread Status:
Not open for further replies.