Matousec Discloses Critical Vulnerability in ALL HIPS

Discussion in 'other firewalls' started by ace55, May 5, 2010.

Thread Status:
Not open for further replies.
  1. fax

    fax Registered Member

    Joined:
    May 30, 2005
    Posts:
    3,899
    Location:
    localhost
    Check Point response to: KHOBE – 8.0 earthquake for Windows desktop security software

     
  2. BrianW

    BrianW Registered Member

    Joined:
    Sep 23, 2006
    Posts:
    2
  3. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    Nice find :).

     
  4. mhl6493

    mhl6493 Registered Member

    Joined:
    Apr 20, 2010
    Posts:
    230
    Location:
    Tennessee
  5. fax

    fax Registered Member

    Joined:
    May 30, 2005
    Posts:
    3,899
    Location:
    localhost
    It is actually been already discussed here..... :)
    The 64bit OSs with patchguard have not been tested by Matousec nor are they affected by the vulnerability. You have to disable the patchguard protection.

    One more evidence that this vulnerablity is known since sometime, nothing new was undercovered and the test has been perfomed not using advanced features available in some security solutions = Ad-hoc distorted testing to get some visibility ;)
     
    Last edited: May 14, 2010
  6. TairikuOkami

    TairikuOkami Registered Member

    Joined:
    Oct 10, 2005
    Posts:
    3,432
    Location:
    Slovakia
    Microsoft: MSE safe from Windows kernel hook attack
     
    Last edited: May 14, 2010
  7. Sm3K3R

    Sm3K3R Registered Member

    Joined:
    Feb 29, 2008
    Posts:
    611
    Location:
    Wallachia
    Finally some vendors are starting researching the issue and fixing it.
    I see nothing wrong if matousec can give "the pie" already cooked for money.I mean you get money for your work usually .
    The issue beeing publically revealed can be researched and fixed by the vendor itself .Is just a question of will and respect towards their users.
    It seems Zone Alarm moved quick ,i like that.
    Now lets see the others :)
     
  8. fax

    fax Registered Member

    Joined:
    May 30, 2005
    Posts:
    3,899
    Location:
    localhost
    Moved quick, LOL?! The option is there since version 9. ie. August 2009 ;)
     
  9. Cudni

    Cudni Global Moderator

    Joined:
    May 24, 2009
    Posts:
    6,963
    Location:
    Somethingshire
  10. blacknight

    blacknight Registered Member

    Joined:
    Sep 25, 2007
    Posts:
    3,347
    Location:
    Europe, UE citizen
    I wish to have very soon an answer from Comodo, Online Armor, Malware Defender.
     
  11. Cudni

    Cudni Global Moderator

    Joined:
    May 24, 2009
    Posts:
    6,963
    Location:
    Somethingshire
  12. bellgamin

    bellgamin Registered Member

    Joined:
    Aug 1, 2002
    Posts:
    8,102
    Location:
    Hawaii
    OnlineArmor's thread about this vulnerability has been responsive but not very encouraging. Thus far they indicate an inability to replicate the issue.

    I tried to post a discussion of this issue in OA's forum but I was inhibited by the fact that OA's forum prohibits all external links. (They do allow links just as long as the links are broken, non-functional hppx links. Sigh)

    Here is the gist of what I tried to post there...
     
  13. Ibrad

    Ibrad Registered Member

    Joined:
    Dec 8, 2009
    Posts:
    1,972
  14. mvario

    mvario Registered Member

    Joined:
    Sep 16, 2008
    Posts:
    339
    Location:
    Haddonfield, IL
  15. Page42

    Page42 Registered Member

    Joined:
    Jun 18, 2007
    Posts:
    6,941
    Location:
    USA
    So what are we to believe regarding GeSWall's ability to handle this vulnerability?
     
  16. blacknight

    blacknight Registered Member

    Joined:
    Sep 25, 2007
    Posts:
    3,347
    Location:
    Europe, UE citizen


    Hi bellgamin, thanks for your answer. ;) I already read some of your linked articles, not yet these of GesWall blog. The power of Wilders Forums is also the continuous exchange of opinions, ideas, links... between the users. :)
     
  17. qpok

    qpok Registered Member

    Joined:
    Apr 3, 2008
    Posts:
    63
    The blog post by G Data is especially good. Seems that Matousec is doing itself more harm than good with the way they handled this vulnerability. And this way they certainly aren't building good reputation in the AV community either.
     
  18. guest

    guest Guest

    Of course the affected software vendors will try to make you think that Matousec (or pretty much any other criticizer) is "totally wrong" (or at least "partially wrong", in case the arguments of the criticizer are strong, like in this case) and that nothing of importance was demonstrated on the reported issue...

    ...until they fix the reported issue. Then, they'll start to brag about "one more kind of protection offer" and act like their previous opinion that "nothing of importance was demonstrated by the issue" simply never existed.

    Boring. Already happened on several different occasions.
     
  19. Though I agree with you regarding security vendors, I must say that what Matousec has done - making the vulnerability and the method for exploiting it public knowledge, and then charging for info relating to a fix - basically amounts to a kind of extortion, and is IMHO very unethical. If they wanted to make money off of this vulnerability, they should have at least kept it out of public site so the script kiddies couldn't get their filthy hands on it.
     
  20. JerryM

    JerryM Registered Member

    Joined:
    Aug 31, 2003
    Posts:
    4,306
    It seems to always be that way.
    In regard to the other test when PC Tools Firewall Plus went down so suddenly, the PC forum acknowledges the problem in a mature way. Seldom do I see that done. The vendors are always in the defensive mode and it is not a legit test until they do well.
    Regards,
    Jerry
     
  21. ace55

    ace55 Registered Member

    Joined:
    Mar 29, 2010
    Posts:
    91
    I presume you mean someone from PC Tools acknowledging this problem on their forum? If so, do you have a link?
     
  22. JerryM

    JerryM Registered Member

    Joined:
    Aug 31, 2003
    Posts:
    4,306
  23. Leach

    Leach Registered Member

    Joined:
    May 5, 2010
    Posts:
    84
    I approve Matousec's decision to open the vulnerability codes to the public. I'm pretty sure the 'Bad guys' are as well educated as security vendors researchers and Matousec's team. I'm not talking about amatuers whos skills spreads not futhers than adding a string into /Run/RunOnce registry hive or using a malware kit - most probably they just won't understand what's all this about. It's good for users as it force vendors to look for solution of the problem. Let vendors have a worm in their tongues it just makes'em move faster and work harder and thats what their grumbles are. 8-D
     
  24. ace55

    ace55 Registered Member

    Joined:
    Mar 29, 2010
    Posts:
    91
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.