Fact-checked by Grok 2 weeks ago

ClamAV


ClamAV is an open-source antivirus engine under the GNU General Public License, designed for detecting trojans, viruses, , and other malicious threats, with a primary focus on systems for file and scanning.
It features a scalable multi-threaded daemon for background scanning, command-line tools for on-demand file inspection, and support for automatic updates to its signature database, enabling detection across numerous file formats and archive types.
Originally developed by programmer Tomasz Kojm and first released on May 8, 2002, ClamAV emerged as a response to the lack of free antivirus solutions for servers, evolving into a widely adopted standard for open-source mail gateway protection.
Since 2016, its development has been led by Cisco's Intelligence Group, which has enhanced its capabilities for use, including integration in and containerized environments, though it remains less suited for high-performance antivirus compared to commercial alternatives.

History

Origins and Early Development

ClamAV originated as an open-source antivirus project initiated by Tomasz Kojm, a computer science student, who released its first version, 0.10, on May 8, 2002. The engine was designed primarily for systems to enable server-side scanning of email attachments for , addressing a gap in free tools suitable for mail gateways where proprietary often dominated. Kojm's motivation stemmed from the need for a lightweight, customizable detection system that could integrate into open-source environments without licensing costs, leveraging signature-based methods to identify known threats. Early development focused on core functionality, including a command-line scanner and basic daemon for background operations, with the project licensed under the GNU General Public License (GPL) to encourage community contributions. By , ClamAV had evolved into a multi-threaded toolkit supporting flexible scanning utilities, reflecting Kojm's ongoing maintenance and research into antivirus engine improvements, such as enhanced for signatures. The project's growth during this period relied on volunteer developers worldwide, who expanded its database of definitions through collaborative updates, establishing it as a viable alternative for resource-constrained servers. Initial releases emphasized reliability over comprehensive detection rates, prioritizing false positive minimization in scenarios.

Acquisition and Maintenance by Cisco

In 2007, ClamAV was acquired by , a cybersecurity firm specializing in network intrusion detection and prevention systems, which began contributing to its development while preserving its open-source status. Sourcefire's involvement enhanced ClamAV's signature database and integration capabilities, leveraging the company's expertise in . On July 23, 2013, announced a definitive agreement to acquire for approximately $2.7 billion, with the deal closing on October 7, 2013. This acquisition integrated 's technologies, including ClamAV, into 's portfolio, transferring maintenance responsibilities to without altering ClamAV's open-source licensing under the GNU General Public License. Post-acquisition, affirmed its commitment to the project's community-driven model, emphasizing continued public releases of updates and signatures. Since 2013, ClamAV has been maintained by Cisco's Intelligence Group, which handles daily signature updates—averaging over 1.5 million new samples processed annually—and coordinates development releases, such as version 1.0 in 2023 introducing improved performance and parsing engines. integrates ClamAV into Cisco's broader security ecosystem for endpoint and network protection while sustaining independent usability for non-Cisco users. This maintenance has ensured regular vulnerability patches and feature enhancements, though critics note potential influences from Cisco's commercial priorities on update prioritization.

Key Milestones and Updates

maintained ClamAV's open-source status post-acquisition, integrating it into the division while committing to community-driven development and regular updates. A significant milestone occurred in late 2022 with the release of ClamAV 1.0.0, the first version to reach the 1.x series after 20 years in the 0.x branch, introducing foundational improvements for long-term stability. This version was designated as the initial (LTS) release under the project's EOL policy, guaranteeing at least three years of support including security patches and signature updates. Feature releases accelerated thereafter, with ClamAV 1.2.0 launched on August 28, 2023, as a stable update focusing on enhanced detection capabilities and bug fixes alongside patch versions for prior branches. ClamAV 1.3.0 followed as another feature release on February 7, 2024, accompanied by security patches for 1.2.2 and 1.0.5 to address vulnerabilities. The project enforced its EOL policy by announcing the end of support for the 0.103 LTS branch on August 7, 2024, with signature updates ceasing after September 14, 2024, urging migrations to newer LTS versions like 1.0. More recently, ClamAV 1.5.0 was released on October 7, 2025, incorporating FIPS-compliant signature verification, metadata enhancements for URIs in and PDFs, and SHA-256 caching upgrades, followed by a 1.5.1 patch on October 16, 2025, to resolve file and scanning performance issues.

Technical Overview

Core Components and Architecture

ClamAV's architecture centers on a with libclamav as the foundational that implements the core antivirus engine for detection. This thread-safe library handles file parsing, signature matching, and scanning of diverse formats including executables (PE, ELF, Mach-O), archives (ZIP, RAR, 7z), and documents (PDF, HTML, RTF), enabling integration into various applications for virus scanning. The engine supports both standard signature-based detection and advanced bytecode signatures executed via an LLVM-based runtime or custom interpreter, allowing for complex behavioral analysis without compromising performance. The primary runtime component is clamd, a multi-threaded daemon that leverages libclamav to provide scalable, on-demand scanning services, typically over or Unix sockets. Clamd loads signature databases into at startup for rapid access, reducing I/O overhead during scans, and processes requests from clients like gateways or upload handlers. Configuration via clamd.conf allows tuning of thread counts, max sizes, and scan heuristics, supporting high-throughput environments such as mail servers. For real-time protection on , clamonacc (introduced in version 0.103.0 as of September 2019) separates on-access scanning from clamd, using kernel-level fanotify or to monitor events and trigger scans asynchronously. Supporting tools enhance database management and standalone operation: freshclam automates downloading and updating signed databases from official mirrors, ensuring timely protection against new threats, while clamscan offers a non-daemonized for one-off scans directly invoking libclamav. Additional utilities like sigtool for inspection and clambc for testing facilitate and debugging, with clamav-milter integrating scanning into or Postfix for email filtering. This component ecosystem promotes efficiency, as the daemon handles persistent loads while libraries and tools enable flexible deployment across systems and integration via .

Signature-Based Detection Mechanism

ClamAV's signature-based detection mechanism operates by comparing byte-level characteristics of scanned files against a predefined database of signatures, enabling identification of known threats through exact or pattern-based matching. The engine, implemented in libclamav, loads signatures from digitally signed compressed database (CVD) files, including main.cvd for stable signatures and daily.cvd for recent additions, which collectively contain hundreds of thousands of entries compiled from community and vendor contributions. During a scan, files are read sequentially, with preprocessing steps such as for text or content—converting to lowercase, removing whitespace, tags, or comments—and automatic unpacking for compressed formats like UPX-packed (PE) files to expose embedded payloads for inspection. Hash-based signatures form a foundational component, targeting static malware by computing cryptographic checksums of entire files or subsections and verifying against stored values. Supported hashes include MD5 (in .hdb files), SHA1, and SHA256 (in .hsb files), with matches requiring both the hash and file size to align precisely, as even a single byte alteration invalidates the result. For PE executables, specialized signatures cover section hashes (.mdb/.msb files) or import table hashes (.imp files), created via tools like sigtool (e.g., sigtool --md5 file.exe > signature.hdb), ensuring reliable detection of unaltered samples but limiting utility against polymorphic variants. Extended body-based signatures provide for code snippets, using a of MalwareName:TargetType:[Offset](/page/Offset):HexSignature, where the hexadecimal string represents byte sequences searchable via regex-like wildcards (e.g., ?? for any byte). can be absolute (e.g., 0), relative to file end (EOF-n), entry point (EP+n), or floating (e.g., 10,5 for positions 10-15 bytes), with TargetType restricting matches to specific file classes like executables or archives. Stored in .ndb files, these signatures leverage efficient search algorithms post-normalization, offering greater flexibility than deprecated .db formats by incorporating version-specific functionality levels for . Advanced variants enhance precision: logical signatures (.ldb files) combine conditions with operators like for multi-pattern rules, while bytecode signatures (.cbc files) execute custom ClamAV for dynamic , such as or unpacker routines, compiled via the introduced in later releases. rules, integrated since version 0.99, allow importing external pattern sets for modular detection. This layered system prioritizes speed through indexed databases and targeted filtering, with custom signatures integrable via additional .ldb or .ndb files in standard directories.

Features

Scanning and Daemon Functionality

ClamAV supports file and directory scanning primarily through the command-line tool clamscan, which utilizes the libclamav library to detect signatures without requiring the daemon. This tool loads the virus database into at each invocation, enabling standalone operation for one-time scans, and accepts options such as --recursive for directory traversal, --infected to report only affected files, and --remove to delete detected threats automatically. Additional controls include --max-filesize to limit scan scope by file size and --log=FILE for directing output to a specified log file, with verbose mode (--verbose) providing detailed progress during execution. The clamd daemon implements multi-threaded scanning functionality, running continuously to serve scan requests over Unix sockets or TCP, thereby avoiding repeated database loading for improved efficiency in high-volume environments. Configured via clamd.conf, it supports directives like LocalSocket for socket paths, LogTime for timestamped logging, and ScanOnAccess to enable real-time monitoring, with signals such as SIGHUP for log reopening and SIGUSR2 for database reloading. Clients interact with clamd using commands like SCAN for file analysis or PING for connectivity checks, and tools such as clamdscan provide a command-line interface to submit scans without altering engine settings. On-access scanning integrates with clamd on systems (kernel version 3.8 or later) via the fanotify mechanism, allowing real-time interception and scanning of file access events to block proactively. This feature, managed through clamd.conf options including OnAccessIncludePath for monitored directories and OnAccessPrevention for access denial on infection, requires elevated privileges and excludes specific users or paths to prevent loops, with the clamonacc client handling event processing from ClamAV version 0.102 onward. Monitoring utilities like clamdtop offer ncurses-based oversight of daemon threads and performance.

Database Management and Updates

ClamAV maintains its detection capabilities through a collection of signature databases stored in compressed ClamAV Virus Database (CVD) format, including main.cvd for established signatures, daily.cvd for emerging threats, and bytecode.cvd for detection logic. These files are typically located in a system such as /var/lib/clamav and can be unpacked or inspected using the sigtool for verification or custom management. Custom text-based s can supplement official databases by placing .txt or .ldb files in the same , though they require manual reloading in the scanning engine. The freshclam utility handles automated downloading and updating of official databases from ClamAV's distribution servers, querying version information via DNS from current.cvd.clamav.net to determine if updates are available. For efficiency, it prioritizes incremental CDIFF patches—small delta files representing signature changes (e.g., 60 KB for thousands of additions)—over full CVD downloads, with full files fetched only if CDIFFs are unavailable or corrupted; CDIFFs are retained for the prior 90 days. Each update verifies digital signatures for integrity and, by default, tests the databases before applying them, notifying the clamd daemon to reload without restart. Official databases receive updates once or twice daily, incorporating community-submitted samples via ClamAV's malware reporting portal to address new variants promptly. Administrators configure freshclam via freshclam.conf to specify update intervals (e.g., daemon mode checking every 2 hours by default in some distributions), settings, or local mirrors for high-volume environments to reduce bandwidth and latency. Manual invocation with sudo freshclam suffices for one-time updates, while jobs or services automate the process; logs in /var/log/clamav/freshclam.log confirm successful "ClamAV update process started" entries. For offline scenarios, databases can be manually downloaded from database.clamav.net (e.g., daily.cvd), though automation via freshclam is recommended for currency. Third-party signatures from sources like Sanesecurity require separate scripts for integration, as they are not part of official updates.

Effectiveness

Empirical Detection Performance

In independent evaluations, ClamAV has demonstrated variable detection rates depending on the sample sets and testing methodologies employed. For instance, in the evaluation for conducted in September 2023, ClamXAV—a graphical interface utilizing the ClamAV engine—achieved 100% detection of widespread and prevalent samples collected over the preceding four months, earning a perfect score of 6 out of 6 in the protection category. This performance reflects ClamAV's strength in signature-based identification of established threats updated in its daily virus definitions. However, broader empirical assessments of ClamAV's core engine reveal lower overall accuracy against diverse corpora. A 2022 analysis by examined ClamAV's performance on a of 416,561 commodity samples, finding a detection rate of 59.94% (249,696 samples identified). This test highlighted ClamAV's reliance on static signatures, which excels for well-known variants but underperforms on obfuscated or less common payloads without integrated behavioral analysis or components.
Test SourceDateMalware Sample FocusDetection Rate
(via ClamXAV)September 2023Prevalent (past 4 months)100%
Commodity Malware Analysis2022416,561 commodity samples59.94%
Earlier benchmarks further illustrate limitations; a 2015 AV-TEST Linux security package evaluation reported ClamAV's detection of Linux-specific threats at approximately 66%, placing it among lower performers compared to commercial alternatives. These results underscore that while ClamAV provides reliable scanning for known signatures in server and gateway contexts, its empirical effectiveness diminishes against zero-day or evasive threats, often necessitating supplementation with other detection layers.

Benchmarks and Comparative Analysis

Independent benchmarks have evaluated ClamAV's malware detection efficacy using diverse datasets, revealing variable performance depending on malware types and test methodologies. In a 2022 Splunk analysis of commodity samples, ClamAV achieved an overall detection rate of 59.94%, identifying 249,696 out of 416,561 malicious files, with stronger results against certain file types like executables (up to 80% in some categories) but weaker against others such as scripts. An earlier 2015 AV-TEST evaluation of Linux security tools against Windows and Linux yielded a low 15.3% detection rate for ClamAV, highlighting deficiencies in cross-platform threat coverage compared to contemporaries. These figures contrast with commercial antivirus solutions, which routinely score 98-100% in standardized tests like AV-TEST's annual Windows assessments, underscoring ClamAV's reliance on signature-based methods without advanced behavioral heuristics. Scanning speed represents another benchmarked aspect, where ClamAV often underperforms relative to optimized engines due to its thorough, resource-intensive signature matching and lack of aggressive caching in default configurations. OPSWAT documentation notes ClamAV's slower throughput stems from engine design prioritizing detection depth over velocity, with scan times potentially extending to hours for large datasets—e.g., full system scans on multi-terabyte drives reported at 11-12 hours on RHEL 8.10 systems versus 2 hours on older versions. In contrast, enterprise tools like those from or achieve sub-minute scans for similar volumes through and , as evidenced in 2025 antivirus comparisons where ClamAV lagged in file processing. Comparative analyses position ClamAV as suitable for server-side and gateway duties rather than , where its open-source nature enables but trails suites in comprehensive threat intelligence. For instance, while ClamAV detected 75.45% of viruses in a 2011 Shadowserver test (fifth among participants), modern commercial alternatives like Kaspersky maintain near-perfect scores across zero-day and polymorphic threats via integration, per AV-Comparatives' 2023 business tests. User-driven evaluations, such as those in 2025 benchmarks, affirm ClamAV's "decent baseline" for known signatures but inferior zero-day handling against leaders like , which incorporate cloud-based analytics for 99%+ efficacy. This gap reflects ClamAV's community-maintained database updates, which, while frequent, lack the research pipelines of vendors investing in global threat feeds.
Benchmark SourceDetection RateMalware FocusYear
Commodity Malware Test59.94%Files (executables, scripts, etc.)2022
AV-TEST Linux Tools15.3%Windows/Linux malware2015
Commercial AV Avg. ()98-100%Multi-platform threatsAnnual
Such disparities emphasize ClamAV's role as a cost-effective supplementary tool in layered defenses, rather than a standalone primary antivirus, particularly in environments prioritizing open-source compatibility over peak performance.

Limitations and Real-World Critiques

ClamAV's signature-based detection mechanism, while effective against known threats, exhibits limitations in identifying zero-day and advanced persistent threats that employ or polymorphism, as it lacks robust behavioral analysis or components found in commercial alternatives. A 2022 Splunk analysis of commodity detection reported ClamAV's overall effectiveness at 59.94%, performing adequately against certain file types like executables but faltering on others such as documents and scripts. Independent tests, such as those by Wizcase in 2022, confirmed near-perfect detection of standard EICAR test samples but failure to identify specific variants, underscoring its reliance on static signatures over dynamic heuristics. False positive rates pose practical challenges, particularly in enterprise environments where erroneous detections disrupt workflows. User reports and issues document instances of widespread false alarms on legitimate archives and attachments, with one 2022 case citing 0.78% false positives across thousands of files in a tar.gz archive. ClamAV's official acknowledges the need for false positive submissions, which can take 48 hours or more to resolve via updates, potentially leading to operational delays. While third-party providers claim low false positive rates, real-world deployments, including in gateways, frequently encounter issues with heuristics flagging benign content. Scanning performance remains a notable drawback, with full scans on large filesystems often requiring excessive time due to sequential processing and signature loading overhead. reports from 2022-2023 highlight scans taking over 24 hours for systems with millions of files, exacerbated by options like PDF and image scanning that can halve throughput without them. OPSWAT analyses attribute slowness to ClamAV's thoroughness but note it lags behind optimized commercial engines in speed, recommending daemon mode (clamd) for mitigation though this introduces memory demands during concurrent updates. File size restrictions cap individual scans at 4GB, necessitating workarounds like splitting for larger artifacts, which risks incomplete coverage. In comparative evaluations, ClamAV underperforms commercial antivirus suites in holistic protection, particularly for use, where it excels more as a supplementary tool for mail servers or file uploads rather than primary defense. Critiques from practitioners emphasize its unsuitability as a standalone solution on desktops or against evolving threats, with community consensus viewing it as "worthless" for broad detection without layered defenses like application whitelisting. These constraints stem from resource-limited open-source development, prioritizing stability over cutting-edge evasion resistance, though variants like ClamXAV have achieved 100% scores in targeted prevalent tests as of .

Deployment and Platforms

Supported Operating Systems

ClamAV is primarily engineered for operating systems, with core functionality relying on compliance for features like multi-threaded scanning and daemon processes. Official builds and documentation emphasize compatibility with distributions (64-bit only since version 1.4.0, released August 2024), (versions 13 and 14 on x86_64), and other BSD variants, where it integrates via package managers or source compilation. Support extends to and historical Unix systems through portable , though testing focuses on modern distributions like those based on for dependency compatibility. macOS receives dedicated PKG installers as universal binaries, accommodating Intel x86_64 and arm64 architectures across recent releases including macOS 15.3 , 14.7 Sonoma, and 13.7 Ventura. These enable command-line tools like clamscan and freshclam for database updates, with Homebrew providing an alternative installation path for broader macOS versions. Windows support is provided via official 32-bit and 64-bit binaries compatible with and subsequent versions, including server editions; this port adapts the engine for Win32 APIs while retaining core detection logic. Graphical frontends like ClamWin leverage this backend for desktop use, though daemon functionality (clamd) requires additional configuration. Emerging platform enhancements include build improvements for AIX in version 1.5.0 beta (March 2025), facilitating compilation on IBM's Unix variant. Cross-compilation from environments supports deployment on less common systems, but official validation prioritizes the aforementioned platforms to ensure reliability in signature verification and scanning performance.

Common Use Cases and Integrations

ClamAV finds primary application in server-side detection, particularly for scanning attachments on gateways to intercept viruses before delivery to clients. The clamd daemon enables efficient, multi-threaded operation, often integrated with mail transfer agents (MTAs) like Postfix via amavisd-new, which acts as an SMTP to route messages through ClamAV for of inbound and outbound traffic. This setup commonly pairs with SpamAssassin for combined spam and virus filtering, processing attachments in formats such as executables, PDFs, and archives. For broader file protection, ClamAV supports on-access scanning through its fanotify-based engine (introduced in version 0.103), monitoring filesystem events to detect malware during writes or executions on Unix-like systems, suitable for shared storage or backup servers. Periodic batch scans using the clamscan utility address ad-hoc needs, such as verifying directories for known threats after system updates or user uploads, with options for multi-threading to handle large volumes efficiently. In HTTP proxy environments, integration with Squid via the SquidClamAV ICAP module enables transparent scanning of web downloads, including encrypted traffic if decryption is configured, preventing malware ingress through browsers. Additional integrations extend ClamAV to application layers, such as embedding libclamav in for server-side validation of uploaded files in web services, or linking with tools like Wazuh for centralized logging and alerting on detections. In messaging platforms like Rocket.Chat, it scans attachments in real-time to block threats during uploads. These uses leverage ClamAV's open-source nature for cost-free deployment in Linux-based infrastructures, though efficacy depends on fresh signature updates from , which catalog over 8 million threats as of recent benchmarks.

Patent Infringement Litigation

In January 2008, filed a complaint with the U.S. alleging that infringed U.S. No. 5,623,600 through its integration of the open-source ClamAV antivirus engine into email security gateways and firewalls. The patent, issued in 1997, claims a method for detecting computer viruses via pattern-matching techniques applied at network gateways to inspect data streams for malicious code before transmission to protected systems. had initially contacted in September 2006 regarding the alleged infringement, demanding either removal of ClamAV from products or licensing fees, but negotiations failed, leading to the action. Barracuda responded by filing a countersuit in the U.S. District Court for the Northern District of in July 2008, asserting that Trend Micro's claims were an attempt to monopolize gateway antivirus scanning and seeking to invalidate the patent on grounds of and obviousness. To bolster its defense, acquired patents from to enable cross-licensing threats against , framing the dispute as a broader threat to adoption in commercial appliances. The litigation extended to similar claims against Panda Software, another vendor incorporating ClamAV, highlighting risks to over one million ClamAV deployments worldwide. The case drew significant opposition from the open-source community, with the launching a of products in February 2008, citing the suit as an example of proprietary vendors using to stifle competition. publicly solicited submissions from developers to challenge the 's validity, emphasizing collective defense against assertions. maintained that the was "tested and valid," having withstood prior challenges, and argued its claims targeted imported infringing products rather than ClamAV itself. The dispute was resolved through an out-of-court settlement, the terms of which were not publicly disclosed, allowing to continue using ClamAV without apparent restrictions. No ITC exclusion order was issued, and the case underscored ongoing tensions between holders and open-source projects, with critics arguing that broad software s like the '600 hinder innovation in antivirus technologies.

Vulnerabilities and Security Incidents

ClamAV has encountered multiple vulnerabilities, predominantly in its parsing engines for complex formats such as PDF, OLE2, and DMG, often resulting in denial-of-service () conditions through buffer overflows or out-of-bounds reads. These issues stem from improper handling of malformed inputs during scanning, potentially allowing unauthenticated remote attackers to crash the scanning process. While no large-scale exploits in production environments have been publicly documented, proof-of-concept code for some flaws has circulated, underscoring the risks for unpatched deployments in gateways or servers. In September 2024, disclosed CVE-2024-20505, an out-of-bounds read in the PDF parsing module affecting ClamAV versions 1.4.0, 1.3.2, and earlier, which could be triggered by crafted PDF files during scans. Concurrently, CVE-2024-20506 was identified in the ClamD service module, involving improper symlink handling that risked arbitrary file access. Both were addressed in security patches released on September 4, 2024, for versions 1.4.1, 1.3.2, 1.0.7, and 0.103.12, with recommendations to update immediately to mitigate exploitation. A critical heap-based , tracked as CVE-2025-20128, was patched in January 2025, affecting the OLE2 decryption routine in ClamAV's parser. This flaw enabled attackers to overrun allocated heap buffers via specially crafted files, leading to process termination and ; a proof-of-concept exploit was made available shortly after disclosure, prompting urgent advisories from . Exploitation required submitting malicious files for scanning but posed risks to integrated systems like secure appliances. Further vulnerabilities emerged in June 2025, including CVE-2025-20260, a write in the PDF scanning processes that could cause or potential code execution, patched in ClamAV 1.4.3 and 1.0.9. Additionally, an out-of-bounds read in (UDF) processing (no specific CVE assigned in initial reports) allowed information disclosure or crashes via malformed UDF files. These updates emphasized the ongoing need for timely database and engine updates, as ClamAV's open-source nature facilitates rapid community reporting but also exposes it to parser complexity inherent in antivirus engines.

Community and Extensions

Third-Party Databases and Tools

Third-party signature databases extend ClamAV's detection capabilities beyond its official virus definitions, often targeting specialized threats such as emails, , and emerging variants that may evade standard signatures. These databases are maintained by independent contributors and integrated via user-configured updates, potentially improving detection rates for email-based attacks but introducing risks of false positives if not properly tested. Prominent providers include Sanesecurity, which supplies signatures focused on phishing, spear-phishing, fake lottery scams, and delivered via email, claiming to enhance ClamAV's effectiveness against macro and malware. SecuriteInfo offers additional signatures emphasizing high detection rates for specific malware families, reportedly achieving up to 90% coverage in certain benchmarks compared to ClamAV's official database around 10%. Other sources like MalwarePatrol, , and OITC provide complementary sets for threats including URL-based and spam patterns. Users must verify these databases for compatibility and monitor for false positives, as Sanesecurity documents procedures for reporting and decoding problematic signatures to minimize disruptions. Tools for managing these databases include the open-source clamav-unofficial-sigs , which automates downloading, testing, and updating signatures from Sanesecurity, SecuriteInfo, MalwarePatrol, , and OITC providers. This , hosted on , supports configuration options for quarantine testing and integration with ClamAV's freshclam or clamd, enabling seamless incorporation into scanning workflows. While ClamAV's built-in tools like freshclam offer limited third-party support, community scripts like this fill the gap for automated maintenance, though administrators are advised to review logs for signature conflicts or performance impacts.

Graphical Interfaces and Derivatives

ClamAV, designed as a command-line antivirus toolkit, lacks a native graphical , prompting the development of third-party front-ends to enhance accessibility for desktop users. These graphical tools typically provide on-demand scanning, database updates, and basic configuration options without altering ClamAV's core engine. ClamTk serves as a prominent graphical front-end for systems, including distributions. Implemented in with the GTK+ toolkit, it offers a straightforward for initiating and scans, viewing results, and managing updates via freshclam. Intended for lightweight, on-demand use, ClamTk supports features like recursive scanning and exclusion lists but does not enable real-time monitoring. It remains available through package managers and repositories as of 2025. For Windows users, ClamWin integrates ClamAV's scanning capabilities into a dedicated graphical application. Released under the GPL, ClamWin includes tools for manual scans, scheduled tasks, and integration with Windows Explorer for context-menu scanning, though it explicitly forgoes on-access real-time protection to maintain compatibility with the engine's design. The project, hosted on , continues to distribute updates aligning with ClamAV's database revisions, with version 0.103.3 supporting Windows up to recent builds. Additional derivatives include KDE-oriented front-ends like ClamAV-GUI, which extend scanning functionality with scheduler integration and file manager plugins for distributions using desktop environments. These tools, often hosted on , emphasize simplicity and automation, such as timed scans and /Konqueror context menus, while relying on ClamAV's backend for detection. Cross-platform efforts, like experimental Electron-based GUIs, aim to unify interfaces but remain in early development stages without widespread adoption.

References

  1. [1]
    ClamAVNet
    - **Description**: ClamAV® is an open-source standard for mail gateway-scanning software.
  2. [2]
    Cisco-Talos/clamav: ClamAV - Documentation is here - GitHub
    ClamAV is an open source antivirus engine for detecting trojans, viruses, malware & other malicious threats.Releases 42 · Issues 291 · Pull requests 20 · Actions
  3. [3]
    Anti-Malware Profile - Cisco
    ClamAV® is an antivirus engine for detecting trojans, viruses, malware and other malicious threats. The current version of ClamAV in use is 1.4. If you opt ...
  4. [4]
    ClamAV - An Open Source Anti-Virus for Servers - Peq42
    Sep 4, 2025 · ClamAV was first released on May 8, 2002, by Tomasz Kojm, a Polish university student, with version 0.10. Over the years, it has grown ...
  5. [5]
    clamav man | Linux Command Library
    ClamAV was originally developed by Tomasz Kojm in 2002 as an open-source project. Its aim was to provide a free and flexible antivirus solution, particularly ...
  6. [6]
    2016 - ClamAV® blog
    Dec 15, 2016 · When development on Dazuko ended in 2011, the ClamAV team began searching for a suitable replacement. The team soon landed on the recently ...
  7. [7]
    ClamAV review (malware scanner) - Linux Security Expert
    Rating 100% · Free · Review by Michael BoelenSep 5, 2024 · The ClamAV project has a long history and is currently under development by Cisco. This is an indirect acquisition, as first the Snort ...
  8. [8]
    Celebrating 20 years of ClamAV
    May 9, 2022 · Tomasz Kojm, the original creator of ClamAV, released the first 0.10 version of the open-source anti-virus engine on May 8, 2002, with the goal ...Missing: origins history
  9. [9]
    Tomasz Kojm - Fosdem 2006
    In 2002 he started the ClamAV project which is now developed worldwide. ClamAV is a GPL licensed anti-virus toolkit for Unix, widely used as a server-side e- ...
  10. [10]
    2006-02-20 - Tomasz Kojm - Previous FOSDEM Editions
    My main duties in ClamAV include the project maintenance and the anti-virus engine research and development. I hold M.S. degree in Computer Science from ...
  11. [11]
    A Continued Commitment to Open Source - ClamAV® blog
    Jul 23, 2013 · Earlier today Cisco announced a definitive agreement to acquire Sourcefire. Marty Roesch has detailed the announcement on our corporate blog, ...
  12. [12]
    Cisco Completes Acquisition of Sourcefire
    Oct 7, 2013 · Cisco (NASDAQ: CSCO) today announced it has completed the acquisition of Sourcefire (NASDAQ: FIRE), a leader in intelligent cybersecurity solutions.
  13. [13]
    Cisco, Community and Open Source - ClamAV® blog
    Oct 8, 2013 · In July we told you about Sourcefire's agreement to be acquired by Cisco, and today that acquisition has closed – we are now one company.Missing: maintenance history
  14. [14]
    Cisco Advanced Malware Protection for Endpoints Windows ...
    Apr 7, 2021 · Details. ClamAV is an open-source antivirus software that is maintained by Cisco. Workarounds.Missing: acquisition | Show results with:acquisition
  15. [15]
    ClamAV OLE2 File Format Parsing Denial of Service Vulnerability
    Feb 7, 2024 · This Cisco advisory is about a ClamAV OLE2 file format parsing denial of service vulnerability, with no workarounds available and a CVSS score ...Missing: Sourcefire | Show results with:Sourcefire
  16. [16]
    Twenty years on, virus scanner ClamAV puts out version 1
    Dec 1, 2022 · The project was acquired by SourceFire in 2007, which itself was subsequently bought by Cisco in 2013, and which still sponsors development.
  17. [17]
    ClamAV EOL Policy
    This document describes the End of Life (EOL) policy for Long Term Support (LTS) feature releases and for regular (non-LTS) feature releases.Definitions · Version Support Matrix · Additional Detail About...Missing: milestones | Show results with:milestones
  18. [18]
    ClamAV 1.2.0 feature version and 1.1.2, 1.0.3, 0.103.10 patch ...
    Aug 28, 2023 · The ClamAV 1.2.0 feature release is now stable and available for download on the ClamAV downloads page, on the Github Release page, and through Docker Hub.Major Changes · Other Improvements · Bug FixesMissing: milestones history
  19. [19]
    ClamAV 1.3.0 feature release and 1.2.2, 1.0.5 security patch release!
    Feb 7, 2024 · The ClamAV 1.3.0 feature release is now stable! Today, we are also publishing the 1.2.2 and 1.0.5 security patch versions.
  20. [20]
    ClamAV 0.103 LTS End of Life Announcement
    Aug 7, 2024 · This end of life date will be Sept. 14, 2024. ClamAV 0.103 users will be able to update signatures from the official database mirror for an ...Missing: milestones history
  21. [21]
    ClamAV 1.5.0 released!
    Oct 7, 2025 · Tuesday, October 7, 2025 · ClamAV 1.5.0 released! · Major changes · Added checks to determine if an OLE2-based Microsoft Office document is ...Missing: timeline | Show results with:timeline<|separator|>
  22. [22]
    ClamAV 1.5.1 Patch Update Addresses PE File and ZIP Archive Issues
    Oct 16, 2025 · ClamAV 1.5.1 antivirus enhances performance and fixes key issues with PE and archive scanning for improved malware detection.
  23. [23]
    libclamav - ClamAV Documentation
    Libclamav provides an easy and effective way to add a virus protection into your software. The library is thread-safe and transparently recognizes and scans.Supported Formats And... · Api · Data Scan FunctionsMissing: architecture | Show results with:architecture
  24. [24]
    ClamAV Documentation: Introduction
    ClamAV is an open source (GPLv2) anti-virus toolkit, designed especially for e-mail scanning on mail gateways.Installing ClamAV · ClamAV Development · Upgrading - ClamAV... · 2.1. PackagesMissing: date | Show results with:date
  25. [25]
    Usage - ClamAV Documentation
    This user guide presents an overview of the various ways that libclamav can be used through the tools provided by ClamAV.
  26. [26]
    Understanding and transitioning to ClamAV's new On-Access scanner
    Sep 16, 2019 · We have a new On-Access scanner for ClamAV that separates functionality from clamd into a new application called clamonacc.
  27. [27]
    Signatures - ClamAV Documentation
    ClamAV body-based signature content has a special format to allow regex-like matching of data that is not entirely known. This format is used extensively in ...4.6. Hash-based Signatures · Logical Signatures · Bytecode Signatures
  28. [28]
    Hash-based Signatures - ClamAV Documentation
    The easiest way to create signatures for ClamAV is to use filehash checksums, however this method can be only used against static malware.
  29. [29]
    Extended Signatures - ClamAV Documentation
    The extended signature format is ClamAV's most basic type of body-based signature since the deprecation of the original .db database format. Extended signatures ...
  30. [30]
    Scanning - ClamAV Documentation
    clamd is a multi-threaded daemon that uses libclamav to scan files for viruses. Scanning behavior can be fully configured to fit most needs by modifying clamd. ...Daemon · ClamD · ClamDTop · ClamD (v0.101)
  31. [31]
    clamscan(1): scan files/directories for viruses - Linux man page
    clamscan is a command line anti-virus scanner. Options Most of the options are simple switches which enable or disable some features.
  32. [32]
    Configuration - ClamAV Documentation
    ClamAV configuration involves creating or modifying `freshclam.conf`, `clamd.conf`, and `clamav-milter.conf` files. Example files are provided, and `clamconf` ...
  33. [33]
    On-Access Scanning - ClamAV Documentation
    ClamAV's On-Access Scanning, available on Linux, uses kernel-space to block malicious file access via fanotify, offering stronger protection.Missing: daemon | Show results with:daemon
  34. [34]
    Signature Database (CVD) - ClamAV Documentation
    ### Summary of ClamAV Signature Database Formats, Update Tools, and Management FAQs
  35. [35]
    Updating Signature Databases - ClamAV Documentation
    The tool freshclam is used to download and update ClamAV's official virus signature databases. While easy to use in its base configuration, freshclam does ...FreshClam · SigTool
  36. [36]
    ClamAV, CVDs, CDIFFs and the magic behind the curtain
    Mar 19, 2021 · The FreshClam utility facilitates the downloading and updating of official signature sets. Here's a full technical breakdown of how FreshClam works.<|separator|>
  37. [37]
  38. [38]
    extremeshok/clamav-unofficial-sigs - GitHub
    The clamav-unofficial-sigs script provides a simple way to download, test, and update third-party signature databases provided by Sanesecurity, FOXHOLE, OITC, ...
  39. [39]
  40. [40]
    How Good is ClamAV at Detecting Commodity Malware? - Splunk
    Nov 28, 2022 · Overall Accuracy on All files. All in all Clam detected just under 60% of the malware in the sample. 249696 / 416561 (59.94%) to be exact.Missing: VirusTotal | Show results with:VirusTotal
  41. [41]
    Linux: 16 Security Packages Against Windows and Linux Malware ...
    Oct 5, 2015 · Coming in at the bottom of the list in detection of Linux malware threats are ClamAV, McAfee, Comodo and F-Prot. Their rates ranged between 66.1 ...
  42. [42]
    Test Results - AV-TEST
    Comparison tests of antivirus software for Windows and reviews of anti-malware Apps for Android.
  43. [43]
    Why does ClamAV seem to be slower than other engines? - OPSWAT
    Due to certain engine-specific design factors, ClamAV is known to be one of the slower performing engines included in the MetaDefender Core system.Missing: benchmarks | Show results with:benchmarks
  44. [44]
    Clamscan is taking 11-12hrs to complete - Microsoft Q&A
    Sep 10, 2025 · I have two boxes both running clamscan virus software. On the box running RHEL 8.4, Clam runs in ~2hrs. On the box running RHEL 8.10, ...
  45. [45]
    Linux Antivirus 2025: My Deep Dive into ClamAV, Bitdefender & ESET
    Linux Antivirus 2025: In-depth comparison of ClamAV, Bitdefender, and ESET. Real-world tests, configs, and why I chose ClamAV after a surprising discovery.Missing: detection accuracy
  46. [46]
    Business Security Test 2023 (March - June) - AV-Comparatives
    Jul 10, 2023 · The Performance Test looks at the impact each product has on the system's performance, i.e. how much it slows down normal use of the PC while ...
  47. [47]
    ClamAV in 2025: The Open-Source Antivirus Powerhouse for ...
    May 13, 2025 · According to independent tests published by organizations such as AV-Test and VirusTotal, ClamAV reliably detects common threats and is updated ...
  48. [48]
    4 Best Antiviruses for Linux in 2025: Expert Ranked - SafetyDetectives
    ClamAV offers good open-source malware protection for Linux. It's our choice for the best free antivirus for Linux in 2025, and it's pretty much the only good ...
  49. [49]
    ClamAV Review 2025: Before You Buy, Is It Worth It?
    Sep 7, 2022 · Near-perfect malware detection rates. ClamAV detected and removed all Eicar malware samples from my device, but failed to detect a trojan file ...🛡️Security · 💡Features · 👍Ease Of Use · 👨‍🔧SupportMissing: benchmarks | Show results with:benchmarks
  50. [50]
    False Positive Signature "Archive.Test.Agent2-9953724-0" #620
    Jun 24, 2022 · I would strongly recommend to provide a fix asap. In a 3.7 GByte tar.gz file with 9099 files clamav found 71 false positives (0.78%). Thats a ...
  51. [51]
    Malware and False Positive Report FAQ - ClamAV Documentation
    How long does it take for a signature change after submitting new malware or submitting a false positive report? In most cases, it takes at least 48 hours from ...
  52. [52]
    Smartermail Virus Scanning - Portal - SmarterTools
    We're getting a LOT of false positives from ClamAV, nearly all of them false positives from the Sane Security phish protection. Some of our customers use a 3rd ...
  53. [53]
    Clamav Performance issue during Full scan #833 - GitHub
    Feb 9, 2023 · If a system is having 17 million files or more, Full scan with clamav is taking more than 24hrs using clamdscan command.Missing: benchmarks | Show results with:benchmarks
  54. [54]
    Since version 0.105 the scan is unbearable slow · Issue #590 - GitHub
    May 21, 2022 · The overall performance is significantly worse with version 0.105 than with version 0.104, I'm sorry but that's all I can say. alext commented ...
  55. [55]
    Why does ClamAV have a file size limit? : r/linux4noobs - Reddit
    Apr 16, 2017 · It has a max filesize limit in order to prevent an attacker sending a ton of big attachments and grind the mail server to a halt as clamav slowly scans the ...
  56. [56]
    So how is ClamAV doing? : r/linux - Reddit
    Oct 7, 2019 · It's very good at detecting malware but only if a matching signature can be found in the database. It doesn't have any advanced heuristics or " ...Why does ClamAV not detect obvious malware - Am I safe?Malware signature based detection question : r/cybersecurityMore results from www.reddit.com
  57. [57]
    ClamXAV Scores 100% on Independent AV Test
    Oct 12, 2023 · ClamXAV scored 100% in Protection, which includes “detection of widespread and prevalent malware discovered in the past 4 months”.
  58. [58]
    ClamAV : r/linux4noobs - Reddit
    Oct 6, 2025 · After some more research about ClamAV, it seems to perform pretty poorly in detecting viruses and most people say it is worthless and not worth ...
  59. [59]
    ClamAV 1.4.0 feature release and ClamAV bytecode compiler 1.4.0 ...
    Aug 15, 2024 · Added the ability to disable image fuzzy hashing, if needed. For context, image fuzzy hashing is a detection mechanism useful for identifying ...
  60. [60]
    Building the Installer Packages - ClamAV Documentation
    Tip: Using an older version of Linux is best. ClamAV's only dependency will be on glibc , which is forwards compatible. That is to say that if you build the ...
  61. [61]
    How to Install ClamAV - Liquid Web
    Step 1: Download and Extract ClamAV Daemon for Windows. · Step 2: Installation and Configuration Files · Step 3: Modifying Configuration Files · Step 4: Install ...
  62. [62]
    Win32 - ClamAV Documentation
    ClamAV offers a versions of ClamAV for Microsoft Windows compatible with both 32bit and 64bit versions of Windows 7 and newer.
  63. [63]
    ClamAV 1.5.0 beta now available!
    Mar 31, 2025 · Build system: CMake improvements to support compiling for the AIX platform. This change is courtesy of GitHub user KamathForAIX. GitHub pull ...
  64. [64]
    Setting Up Amavis and ClamAV on Ubuntu Mail Server - LinuxBabe
    Jun 2, 2022 · Step 2: Integrate Postfix SMTP Server With Amavis. Amavisd-new works as an SMTP proxy. Email is fed to it through SMTP, processed, and fed back ...
  65. [65]
    Complete Virtual Mail Server/amavisd spamassassin clamav
    Amavisd acts as a mail server, filtering mail with SpamAssassin and ClamAV, which are used to block spam and viruses.
  66. [66]
    ClamAV Antivirus for Linux Tutorial | HackerTarget.com
    May 18, 2021 · Now maintained by Cisco Talos, after the acquisition of SourceFire in 2013. You may have heard of Cisco, a small startup that makes ...Missing: maintenance history
  67. [67]
    Implementing server-side malware scanning with ClamAV in Node.js
    Feb 5, 2025 · By integrating ClamAV, you can scan uploaded files for malware before processing or storing them, significantly enhancing your web application's ...
  68. [68]
    ClamAV logs collection - Malware detection - Wazuh documentation
    Wazuh detects malicious files through integration with ClamAV, a free and open source antimalware engine for detecting various types of malware.
  69. [69]
    ClamAV Integration | Rocket.Chat App
    Integrate ClamAV with Rocket.Chat to scan uploaded files for viruses and malware in real time, ensuring safe and secure communication.
  70. [70]
    Barracuda Fights Trend Micro Patent Infringement Allegations - CRN
    Jan 29, 2008 · According to the ITC claim, Trend Micro alleges that Barracuda violated patent laws regarding Trend Micro's U.S. Patent 5,623,600 in several ...
  71. [71]
    Barracuda defends open-source antivirus from patent attack
    Jan 29, 2008 · In an effort to protect the ClamAV project and its users from predatory infringement claims, Barracuda has decided to take the matter to court ...
  72. [72]
    [PDF] Recognizing The Growing Risk Of IP Litigation Facing OSS ...
    Trend Micro asserts that ClamAV infringes on its '600 Patent. In September 2006, Trend Micro con- tacted Barracuda regarding the alleged infringement and sought ...
  73. [73]
    Barracuda bites back at Trend Micro in ClamAV patent lawsuit
    Jul 2, 2008 · Security appliance vendor Barracuda Networks has filed a countersuit against Trend Micro in an effort to protect the open source ClamAV ...
  74. [74]
    Trend Micro stresses 'tested' patent in trade case - Network World
    Jan 29, 2008 · Almost anyone, including the owners of more than 1 million ClamAV installations, could be sued by Trend Micro if the company's patent claims ...
  75. [75]
    Boycott Trend Micro - Free Software Foundation
    Feb 11, 2008 · They claim that Barracuda is violating their patent by distributing the free software antivirus program ClamAV. We should avoid using any ...
  76. [76]
    Invalidating harmful patents - software patents wiki (ESP Wiki)
    Dec 28, 2023 · ... Barracuda would win, Trend Micro offered an out of court settlement and the invalidation never happened. Prior art or subject matter.
  77. [77]
    ClamAV OLE2 File Format Decryption Denial of Service Vulnerability
    Jan 22, 2025 · A vulnerability in the Object Linking and Embedding 2 (OLE2) decryption routine of ClamAV could allow an unauthenticated, remote attacker to ...
  78. [78]
  79. [79]
  80. [80]
    ClamAV 1.4.1, 1.3.2, 1.0.7, and 0.103.12 security patch versions ...
    Sep 4, 2024 · We are publishing the 1.4.1, 1.3.2, 1.0.7, and 0.103.12 security patch versions. The release files for the patch versions are available for download.Missing: major | Show results with:major
  81. [81]
    Cisco warns of a ClamAV bug with PoC exploit - Security Affairs
    Jan 26, 2025 · Cisco addressed a ClamAV denial-of-service (DoS) vulnerability, and experts warn of the availability of a proof-of-concept (PoC) exploit code.
  82. [82]
    CVE-2025-20260 Detail - NVD
    Jun 18, 2025 · A vulnerability in the PDF scanning processes of ClamAV could allow an unauthenticated, remote attacker to cause a buffer overflow condition.
  83. [83]
    ClamAV UDF File Parsing Out-of-Bounds Read Information ... - Cisco
    Jun 18, 2025 · A vulnerability in Universal Disk Format (UDF) processing of ClamAV could allow an unauthenticated, remote attacker to cause a denial of ...Missing: acquisition milestones
  84. [84]
    ClamAV® blog
    ### Key Milestones, Major Version Releases, and Significant Updates for ClamAV Since 2013
  85. [85]
    Community Projects - ClamAV Documentation
    Compatibility may vary. Signatures ... clamd is a portable Python module to use the ClamAV anti-virus engine on Windows, Linux, MacOSX and other platforms.
  86. [86]
    Sanesecurity signatures: improve ClamAV detection rate
    Sanesecurity ClamAV signatures improve ClamAV detection rate on Macro malware, Javascript malware, Phishing, Spam and other emailed Ransomware.Signatures · False Positives · Improve ClamAV detection rate · Foxhole databases
  87. [87]
    Signatures - Sanesecurity ClamAV: Phishing, Spam & Malware ...
    The following tables contains a brief list of all Third-Party databases, their brief description and also my opinion on their approximate false positive risk.
  88. [88]
    ClamAV Unofficial Signatures: Sanesecurity download script: linux
    The clamav-unofficial-sigs script provides a simple way to download, test, and update third-party signature databases provided by Sanesecurity and other useful ...
  89. [89]
    wusel1007/clamav-gui: Front-End for ClamAV - GitHub
    This application provides a graphical user interface for clamav and freshclam with an integrated service menu for Konqueror/Dolphin to scan files directly from ...
  90. [90]
    Install ClamTk on Linux - Flathub
    Easy to use graphical user interface for Clam Antivirus (ClamAV). ClamTk is intended to be an easy to use, light-weight, on-demand scanner for Linux systems.
  91. [91]
    ClamTK - Linux Mint - Community
    ClamTk is a graphical front-end for Clam Antivirus. It is designed to be an easy-to-use, lightweight, on-demand antivirus scanner for Linux systems.
  92. [92]
    Free Antivirus for Windows - Open source GPL virus scanner
    ClamWin is a free, open-source antivirus for Windows with high detection rates, but it is a standalone scanner, not real-time, and requires manual scanning.Download · About ClamWin Free Antivirus · ClamWin Free Antivirus 0.103... · News
  93. [93]
    ClamWin download | SourceForge.net
    Rating 4.5 (151) · Free · WindowsFree Antivirus software for Windows, using the well-respected ClamAV scanning engine. Includes virus scanner, scheduler, virus database updates.ClamWin Reviews · ClamWin Files · ClamWin Support
  94. [94]
    ClamAV-GUI - KDE Store
    A graphical Front-End for the ClamAV Anti-Virus Scanner. It uses freshclam as a backend for signature updates and provides a scheduler for timed virus scanns.
  95. [95]
    Cross-platform Desktop GUI for ClamAV antivirus. - GitHub
    Cross-platform Desktop GUI for ClamAV antivirus ... This version will be released soon and is expected to offer tremendous improvements over the previous ones.