SCF Advanced Search



Members
Stats
  • Total Posts: 35263
  • Total Topics: 10683
  • Online Today: 1073
  • Online Ever: 51419
  • (01. January 2010., 10:27:49)











Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.scforum.info:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: Samker
« on: 12. December 2015., 09:33:31 »



Some of the biggest names in the security software business have been compromised by a serious flaw that could allow a hacker to use the commercial security code to infiltrate computers.

In March, researchers at security firm enSilo found a serious flaw in popular free antivirus engine AVG Internet Security 2015. They found that the software was allocating memory for read, write, and execute (RWX) permissions in a predictable address that an attacker could use to inject code into a target system.

enSilo got in touch with AVG and the flaw was fixed within a couple of days. But the team then went through other security suites and found that McAfee VirusScan Enterprise version 8.8 and Kaspersky Total Security 2015 were also vulnerable.

"We'll continue updating this list as we receive more information," said Tomer Bitton, VP of research at enSilo, in a blog post: http://blog.ensilo.com/the-av-vulnerability-that-bypasses-mitigations

"Given that this is a repetitive coding issue amongst Anti-Virus – an intrusive product, we believe that this vulnerability is also likely to appear in other intrusive products, non-security related, such as application-performing products."

This isn't a theoretical attack vector. Google's in-house hacker Tavis Ormandy found a similar issue with Kaspersky and wrote a blog post detailing how to exploit the problem: http://googleprojectzero.blogspot.co.il/2015/09/kaspersky-mo-unpackers-mo-problems.html

Given the possible widespread nature of the problem, enSilo has created a free checking utility called "AVulnerabilityChecker" and stuck it on Github for anyone to use: https://github.com/BreakingMalware/AVulnerabilityChecker
Intel, owner of McAfee, and Kaspersky have now fixed the issue, but users are advised to check that they have all the latest updates.

(ElReg)

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Terms of Use | Privacy Policy | Advertising