Anti-virus vendor Avira yesterday issued a botched signature update that flagged the client as malware.
The update falsely detected AESCRIPT.dll as spyware TR/Spy.463227.
It was was pulled shortly after its release.
"The spreading of the false VDF (Virus Definitions File) was stopped immediately and is now corrected with a new VDF," Avira operations Stefan Berka said.
Customers were urged to update to VDF 220.127.116.11.