Feeds

Security software: blind lead blind

Commentary by Elias Levy

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

It's incredible that in this day and age some of the most popular security products, products that are marketed as protecting you from the evils of computers, are so badly designed.

Case in point: The many antivirus products that failed to detect and stop the highly effective SirCam worm, even when updated with the latest signatures and when configured correctly.

Symantec's Norton Antivirus for Gateways v2.x, Norton Antivirus POP email scanner, and TrendMicro's InterScan VirusWall Standard and CVP editions version 3.51 build 1321 for Windows NT all failed to block SirCam. Why? Because all products "failed open," i.e., when they encountered email messages they couldn't handle properly, they sent them through by default.

SirCam spread via email as an infected attachment, and, unlike most other worms, included its own code to send out the infected messages. The email messages generated by the worm were slightly malformed, and while many email clients are lax enough in their parsing of messages to display the message and its attachment correctly (IETF's motto: "be strict in what you produce and tolerant to what you receive"), the flaw in the headers stopped those antivirus products from detecting the attachment and the worm.

Instead of quarantining malformed messages, the security products happily forwarded them to their destination.

Symantec corrected NAV for Gateways in version 2.5.1 by adding a new option named "Messages that can't be processed" which allows the administrator to configure it to either drop, bounce, or deliver malformed message. Notice the lack of a "quarantine" option. TrendMicro fixed InterScan VirusWall by being more permissive in its parsing of messages so that the attachment can be successfully decoded for scanning.

It seems security problems are common in antivirus products.

Look at the poor folks at TrendMicro. This year alone there have been fourteen different vulnerabilities reported in their InterScan product line. Last year, at least four vulnerabilities were reported in a number of their products. Many of these vulnerabilities allow remote command execution on the host where the product is installed. Several of them are buffer overflows. Two new vulnerabilities were just discovered in their AppletTrap product.

Other types of security products are not far behind.

CheckPoint's FireWall-1, the leading firewall by market share, had at least four vulnerabilities reported this year, and at least eleven reported last year.

My intention is not to berate or point the finger at these companies. But one has to wonder, if vendors that specialize in security can't produce a secure product, what chance does any other software vendor have? And before you mention open source as a solution, consider its track record. With some exceptions, it's not much better..

Writing secure code is hard; designing a security product harder. They both require a lot of time, effort, and money. Complexity only makes things more difficult. All these factors are working against security.

Complexity is increased in each revision of the software by adding more features. Time to market is essential to the commercial success of the products, and is shrinking all the time. Each product is made with as little money as possible, so as to increase its return, and allow the vendor to price it at a level customers will buy. Customers are always asking for more features, as soon as possible, and for a cheaper product.

Until we master the art of building a security product that deserves the label, the outlook is grim. I suggest you buy insurance. Lots of it.

© 2001 SecurityFocus.com, all rights reserved.

Elias Levy is CTO of SecurityFocus and moderator of the BUGTRAQ security mailing list.

Providing a secure and efficient Helpdesk

More from The Register

next story
Microsoft on the Threshold of a new name for Windows next week
Rebranded OS reportedly set to be flung open by Redmond
Business is back, baby! Hasta la VISTA, Win 8... Oh, yeah, Windows 9
Forget touchscreen millennials, Microsoft goes for mouse crowd
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Apple: SO sorry for the iOS 8.0.1 UPDATE BUNGLE HORROR
Apple kills 'upgrade'. Hey, Microsoft. You sure you want to be like these guys?
ARM gives Internet of Things a piece of its mind – the Cortex-M7
32-bit core packs some DSP for VIP IoT CPU LOL
Lotus Notes inventor Ozzie invents app to talk to people on your phone
Imagine that. Startup floats with voice collab app for Win iPhone
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.