Approximately 800 vulnerabilities discovered in antivirus products

Discussion in 'other security issues & news' started by MrBrian, Jul 8, 2008.

Thread Status:
Not open for further replies.
  1. kwismer

    kwismer Registered Member

    Joined:
    Jan 4, 2008
    Posts:
    240
    ok, the post in question is defense in depth revisited, though i've since posted again about the very same announcement this thread is about...

    i basically think their figures are FUD, they don't make sense, they don't match up with those of independent organizations, and nruns is anything but independent (making av products look bad drives demand for their own product)...
     
  2. Arup

    Arup Guest

    If this article had even 50% relevance then all of us would be running systems full of malwares, Trojans and virus. So far thats not basically the case, there are infected systems out there but not in the sense which the article is trying to relate to.
     
  3. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    Thank you :). You have some nice blog entries there.

    My own take on this is that at least some of these claimed vulnerabilities do exist, but I'm not going to lose sleep over it unless exploits targeting AV become more common.
     
  4. emperordarius

    emperordarius Registered Member

    Joined:
    Apr 27, 2008
    Posts:
    1,218
    Location:
    Who cares
    Every software can have vulnerabilities. Even security softwares. Perfect programming is not possible.
     
  5. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
  6. Dogbiscuit

    Dogbiscuit Guest

    Can you offer any specifics here for clarification?
     
  7. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
  8. Dogbiscuit

    Dogbiscuit Guest

    According to the example, had your AV not detected the data file as containing malicious code and Winamp processed the .pls file, could the admin account of your system been compromised even if running as LUA+SRP? Or would the user account have been compromised only?
     
  9. Dogbiscuit

    Dogbiscuit Guest

    With DEP compatible applications and Vista (w/ASLR, etc.), wouldn't this eliminate the need for this aspect of an AV's protection in restricted accounts?
     
  10. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    If a privilege escalation exploit were available and used within the initial buffer overflow exploit code, then yes it could compromise the system even with LUA+SRP. Whether this has ever actually happened in practice, maybe somebody else can address.

    IMHO no, because many 3rd-party programs don't use these technologies. IE 7 also has DEP off by default.
     
  11. Dogbiscuit

    Dogbiscuit Guest

    Thanks for your explanations.
     
  12. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    You're welcome :).

    I also forgot to mention that even if your other security measures protect you from harm, a positive AV detection can prevent you from passing potentially harmful files to others who might not employ the same security measures as you do.
     
  13. Dogbiscuit

    Dogbiscuit Guest

    Good point about not passing on infected files to others.

    So maybe someday when all the Vista applications that someone uses are DEP aware and enabled, then buffer overflow exploits will no longer be a serious problem?
     
  14. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    To avoid going off topic, perhaps read this buffer overflow thread and post there if you have questions. Post #119 there has links that contain a lot of related info.
     
  15. Dogbiscuit

    Dogbiscuit Guest

Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.