ClamAV "does scan for linux viruses".

If you install ClamAV, you can use the sigtool command to find signatures
for unix-specific malware.

Eg:
> sigtool --list-sigs /usr/local/share/clamav/daily.cld | grep -i 'unix'
.
.
.
Exploit.Shellcode.Unix-Gen-1
Trojan.Plunix-1
UNIX.Worm.Sorso
UNIX.Exploit.CVE_2010_3301-1
UNIX.Trojan.SSHDoor
Unix.Backdoor.Cdorked
Unix.Exploit.CVE_2014_1912-1
Unix.Exploit.CVE_2014_1912
Unix.Downloader.Agent
UNIX.Exploit.CVE_2010_3301-2
UNIX.Trojan.Snakso
Unix.Exploit.Iosjailbreak
Unix.Exploit.Fsheep
Unix.Trojan.Hanthie-3
Unix.Trojan.Hanthie-4
Unix.Trojan.Ebury
Unix.Trojan.Ebury-1
Unix.Trojan.Ebury-2
Unix.Trojan.Hanthie
Unix.Trojan.Hanthie-1
Unix.Trojan.Hanthie-2
Win.Trojan.Gunix-1
.
.
.

Additionally, there are signatures for malware or exploits that can target
multiple platforms. An example is the signature PHP.Shell-38 as gin(e)
pointed out.

- Alain



On Thu, Apr 17, 2014 at 10:46 AM, Dave Shevett <shev...@pobox.com> wrote:

> Hi folks, sorry for the seemingly silly question, but I can't find it in
> he FAQ nor can I find it by S-ing TFW.
>
> Does clamav on linux scan for 'linux viruses'?  I know the definition of
> that is nebulous, and the number of documented linux virii is extremely
> low (for ones that would not be classified as root hacks or simple
> coding errors).
>
> I need to present to management that we don't need to run clamav virus
> scans across /usr/bin, /lib, /usr/sbin, etc.  We should, however, have a
> root kit checker installed (right now we do use 'aide' to function as a
> tripwire mechanism).
>
> But, can I say "clamav does not scan for linux viruses" or is that not
> true?
>
>     -d
> _______________________________________________
> Help us build a comprehensive ClamAV guide:
> https://github.com/vrtadmin/clamav-faq
> http://www.clamav.net/support/ml
>
_______________________________________________
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq
http://www.clamav.net/support/ml

Reply via email to