I was asked about this and visited-refreshed Drudge using both Firefox and Chrome and received the same Avast error. I viewed the source and was like wow, talk about allot of Ad and tracking scripts being loaded from many 3rd party non-Drudge sites. That cannot be good if you care about privacy and raises your risk of infection. This is why I recommend to people to use aggregators and sites like newslookup that host all content locally without tracking.
With that said I took a look at the source and at least found part of the code that triggers the alert.
<script type="text/javascript" src="http://cdn.intermarkets.net/u/Intermarkets/DrudgeReport/drudgereport_targeting.js"></script>
contains this line:
document.write('<scr' + 'ipt type="text/javascript" src=\'http://neo.go.sonobi.com/trinity.js?key_maker=' + JSON.stringify(associations) + '\'></scr' + 'ipt>');
neo.go.sonobi.com in the code above will sometimes resolve to 54.191.159.30. I downloaded the trinity.js file and at the moment I downloaded it from that IP it only contained the following code. (to be safe do not try downloading this, I performed the download outside the browser in isolation)
sbi_trinity={};sbi_dc='aws.';
// 0.000019 -6.37
So this is triggering avast or it is triggering something else in the script that triggers avast or at the time I download trinity.js the offending malware was absent.
I suspect the problem appears not only with drudge but will happen if you visit other sites that use sonobi.com Ad technology when the trinity.js file resolves to 54.191.159.30. For example I tried another site that uses Sonobi Ad servers today and received the same message. Perhaps that one sonobi ip is hosting malware since the error is not consistent with other sonobi.com ip's.