Top 12 Operating Systems Vulnerability Survey 206
markmcb writes "Have you ever wondered how vulnerable your computer is from the first bit you write to the hard drive all the way until you have a fully patched system? If so, Matthew Vea has posted a concise summary of security strengths and shortcomings for twelve of the major operating systems of 2006/2007. In his summary, Matt tests each OS with widely available tools like nmap and Nessus, and notes responses at install, pre-patch, and post-patch times for each system. After the tedious job is done, he produces results that will make both the Apple and Windows communities cringe with regards to security. From the article: 'As far as straight-out-of-box conditions go, both Microsoft's Windows and Apple's OS X are ripe with remotely accessible vulnerabilities ... The UNIX and Linux variants present a much more robust exterior to the outside. Even when the pre-configured server binaries are enabled, each [Linux] system generally maintained its integrity against remote attacks.'"
No OpenBSD? (Score:2, Interesting)
Re:No OpenBSD? (Score:5, Informative)
Title says, "Top 12"? (Am guessing.)
Calm your self... (Score:5, Insightful)
1) Ignorance (They don't know they need them)
2) Slow Connections (They don't want to wait 3 days for updates to download)
3) Incompatibility (They are afraid that if they download a patch from MS it will break something)
With 90% of the market being controlled by windows users and the majority of those users being nontechnical home users, you can see the problem. It is the exact reason the US tops the list for infected systems for viruses and spyware.
Re: (Score:2, Interesting)
Re: (Score:2)
Go ahead, get an off-the-shelf USB wheel-mouse working on OpenBSD without spending at least 2 days hand-building kernels and other components.
come on... (Score:3, Insightful)
Re:come on... (Score:5, Insightful)
My only complaint is that Windows XP should be tested as installed from SP2, since any XP CD distributed through authorized channels today has SP2 built in.
But you have to realize that Windows XP is the most common version of Windows in use today, and so it is reasonable to test it today...
Re: (Score:2)
Re: (Score:2)
I recently reinstalled an XP machine for my sister-in-law, and when I was done with the recovery CD, I'm not sure if the system was at base, or at SP1. I had to install a pile of updates with numerous reboots, and THEN I was able to install SP2, plus then I went on to install yet more updates. Maybe I did it the hard way, maybe I'm a noob with Microsoft products, maybe it has something to do with
Re: (Score:2)
Re: (Score:2, Insightful)
Re: (Score:2)
Also,
The UNIX and Linux variants present a much more robust exterior to the outside
might be true until you install most PHP apps in non-CGI mode, whereupon in most cases you've set up a race condition as to who runs admin.php first, and that's if your end user remembers to turn off execution permissions after running the script, and, if (s)he doesn't, your entire machine is compromised because every single PHP app is running under the same users...
Re: (Score:2)
Concise? (Score:4, Insightful)
Concise? Forgive me, but I was expecting a table or something that makes it easy to see the results. Instead it's 20 printed pages. I'd hate to see the expanded version!
Re:Concise? (Score:4, Insightful)
It was much nicer than most stories that make it to the front page; I didn't have to keep clicking the next page button every 50 words. It was good stuff, there were no ads (although I do run adblock) and a great deal of easy to read information.
Let's just hope that
Re: (Score:2)
Stupid Comparison (Score:2)
I update all my WinXP installs OFFLINE, making sure that they are FULLY patched and running the latest AV before putting them on the wire. The issue is that Microsoft doesn't make it easy to do this, and I have to use third party products to properly secure their systems before they go online. (90+ Patches from SP2?????)
To me, that is the greatest of all faults.
Not A Stupid Comparison (Score:2)
Re: (Score:2, Insightful)
Re: (Score:3, Insightful)
That's what I'm talking about. I comment in another location that they should be testing against the SP2 version because if you get XP today, that's what you're installing.
But the period between SP2 and the patches, that's a time when the machine is typically on the 'net and potentially vulnerable.
Re: (Score:2)
RTFC[omment], pal. He installs non-SP2 XP, and then patches up to SP2. If you get Windows XP today, you will be getting it with SP2a integrated by Microsoft. This is not what he installed.
It's true that an older XP user will be installing a pre-SP2 edition of XP if they do a reinstall, so there is some merit to his test methodology. But it would make more sense to
This is a survey of security? (Score:5, Interesting)
Re: (Score:2)
"I ran Nessus and then nmap, and this is what it said." Ooo, let me bow to your geekdom. And then he picks a raw version of XP...that's so unfair there aren't even words...Seriously, most of those flaws were fixed years ago, and you can't even buy XP like that anymore.
It would have been totally appropriate (Score:2)
Since it did not, we here at
It's no worse than anyone else's. (Score:2)
Re: (Score:2)
Also, they missed the recent solaris telnet vulnerability (telnet -l -froot host).
Finally, they say that OSX was insecure out of the box, even tho it had no services turned on by default and they had to explicitely enable them.
Macs Still Safe in Default State (Score:5, Insightful)
Re: (Score:2)
Re: (Score:3, Insightful)
Re: (Score:2)
Exactly, and how are you going to get that firewall installed on XP SP2 before you are able...to...uh, never mind.
Re: (Score:2, Funny)
Re: (Score:3, Informative)
Re: (Score:3, Informative)
Re: (Score:2)
This would work better if it were easier to register the license keys remotely, but it's workable.
Re:Macs Still Safe in Default State (Score:4, Insightful)
Re:Macs Still Safe in Default State (Score:5, Insightful)
But then they conclude OSX is rife with vulnerabilty during the patching process, which is pretty misleading if you ask me.
Re: (Score:2)
Definitely biased. Loved that FreeBSD had nothing at all turned on... and got perfect goo-goo-gah-gah wonderful text.
Whatever. He's a tard. Moving right along...
Re: (Score:2, Informative)
True, but as far as I can tell the only vulnerability even with the services specified switched on is the possibility to gather usernames by guessing them. See http://www.vnutz.com/content/exploit/Nessus_Apple_ OSX_Tiger_10.4.8_Vulnerabilities.html [vnutz.com]. Nessus ranks them as low at worst. Nothing to be too excited about.
Windows XP SP2 is a bit worse with one high risk allowing for remote code execution. All in all, not too bad compared to Win XP SP1. Both OSes are secure enough for desktop use. (As long as you
Re: (Score:2)
And in order to share printers with other systems, of course it needs to listen on the network, there's no way around that.
Nessus and Nmap (Score:5, Informative)
Re: (Score:2)
Granted, this can, in the right hands, be a means of finding new vulnerabilities. But it's a hell of a lot more work and if you're only interested in known problems - why bother when someone else has already scripted the lot?
IMO, a well-maintained server's weakest link these days is stuff like weak passwords (for anything which requires user authen
Obligatory missing option post. (Score:3, Insightful)
What no OpenVMS [hp.com] analysis?
Re:Obligatory missing option post. (Score:4, Funny)
MacOS X vs. UNIX? (Score:2)
Hmm... MacOS X bad... UNIX good.
Presumably this contradiction is resolved by noting that on MacOS X, the vulnerable services are off by default, so MacOS X is in fact ripe with vulnerabilities out of the box, yet still presenting a robust exterior?
Nice Cherrypicking (Score:5, Insightful)
The article also says:
Out of the box, OS X is highly secure. You make the active decision to risk remote exploits when you enable these services.
For OS X Server, they had this to say for it, "Out of the box":
The lesson to be learned here is that an open connection is a potentially exploitable one. So don't open connections unless you're sure you want to do so. The second part of that lesson is if you're going to enable a remote port, make sure your security patches are up to date. "Out of the box" software is only secure for a short period of time.
Re:Nice Cherrypicking (Score:5, Insightful)
Which is one reason it's so hard to secure a windows system. Who knows what half of those listening services actually do and what depends on them.
Also, you missed the third part, which is to configure the services you do need conservatively (ie, configure apache to not allow methods you do not use for your site, disable anonymouse FTP, or if needed lock its permissions and probably chroot it, etc).
Security isn't *too* hard if you have admins that actually listen to their lead security guy:
Yes, there is a lot more to security, and how services are used factors into your response in how to mitigate any known problems, but the sysadmin security stuff boils down to the above list.
Re: (Score:2, Insightful)
I do, lots of people do.
Which one do you have a question about?
It's not that hard to learn Windows.
Re: (Score:2)
I guess you don't use your computer for much.
Re: (Score:3, Insightful)
People that are serious about security and don't want their boxes compromised.... For instance, me.
An OS service is an OS service - figuring out *nix services is no easier or harder than figuring out Windows services.
Re: (Score:2)
Reading this, though, where they say they just "enabled all the services" shows that the methodology in this analysis is pretty bad. Did they also enable SMB and AFP file sharing services on the other systems? Enable Apache/IIS?
Re: (Score:2, Insightful)
So they take a secure machine and start services to make it less secure, but they can't be bothered to turn on the firewall?
Odd...
Re: (Score:2)
Re: (Score:2)
Relying on Nessus alone isn't much use anyway - basically all it does is compare banner output to what's in it's database. If you apply a patch that doesn't update the banner (say a patch backported to a previous version), Nessus w
Re: (Score:2)
If they'd installed Solaris correctly, they'd have had the same out-of-box results
Well, it's not their fault the Solaris installer works correctly. Maybe if it had a defective one like Fedora...
(From TFA, describing the Fedora testing):
Despite the previous configuration prompts, the chosen servers [FTP, Mail, NFS, SSH, Samba, HTTPS, telnet and HTTP] were still not enabled.
Fedora's so security-conscious, it won't start services that might get compromised! Next release, they may improve security by simply not shipping any network drivers... ;)
Did anyone else find it odd that they went out of their way to load the entire Solaris distribution, but cherry-picked the Fedora options they loaded? No, I guess I'm not either...
big deal... (Score:2)
Read carefully what was done on MacOS X (Score:5, Insightful)
Now once you enable a service, it's legitimate to then analyze the exposed service for vulnerabilities, and I found that information interesting.
But it should have been clearly established that the vulnerabilities noted in Mac OS X are for services that the user specifically enabled. The general description does not call this out, and I think that the conclusions are flawed because of this.
dave
Re: (Score:2)
The FA is quite explicit in telling you that they enabled various services.
Are you complaining about the summary?
Re: (Score:2)
As far as "straight-out-of-box" conditions go, both Microsoft's Windows and Apple's OS X are ripe with remotely accessible vulnerabilities.
To most people, "straight out of box" means "without screwing around with things." That is not the sense in which they are using it. In fact, they plainly state about OS X that "the issues were not remotely accessible" earlier in the article.
And to most people, "straight out of the box" doesn't mean "a box you bought a year ago." There was no excuse for testing a pre-10.4.8 version of Mac OS X Server, but no equally old versions of L
Re:Read carefully what was done on MacOS X (Score:4, Insightful)
Any remote network vulnerability that treats MacOS X as anything other than another UNIX distro has built-in bias.
Re: (Score:2)
They applied the same standard and procedure to FreeBSD. Nessus revealed *zero* vulnerabilities. It's all great and fine to disable services by default, but what happens when you want to use those services?
Re: (Score:2)
It would be an interesting follow-up to see if these vulnerabilities are fixed. This would establish that
(a) if you're up-to-date for OS X, you are or are not still at risk, and
(b) Apple is slower than the Linux alternatives in patching known vulnerabilities (but does fix them)
Since many of the tested services are built on Open Sou
Re: (Score:2)
Note that the article didn't call services listening on their appropriate port a vulnerability.
Re: (Score:2)
2. My problem is this statement in the summary:
As far as "straight-out-of-box" conditions go, both Microsoft's Windows and Apple's OS X are ripe with remotely accessible vulnerabilities.
If you install MacOS X or MacOS X Server out-of-the-box, and do NOT enable any services, then MacOS X has a very different vulnerability profile than Windows.
If you do the ne
Be careful jumping to conclusions on prepatched OS (Score:2, Insightful)
An OS that was shipped in 2006 SHOULD have far fewer out-of-the-box holes than one that was shipped 6 years ago *coughXPcough*.
The "interesting" releases are the releases most likely to be installed by someone doing a fresh install today.
This usually means what he buys at the store, downloads as an ISO, or installs from the network plus any patches he can easily download, put on a CD or USB stick, and instal
Vista was not visible... (Score:2, Insightful)
In order to identify any Vista services present, it was necessary to disable the default firewall after booting into the system for the first time. After disabling Vista's firewall, Nmap was able to identify three open ports for Windows networking and correctly fingerprinted the system Windows Vista.
Sorry, but what's the point in doing this? Out of the box, vista comes with no open ports. Deal!
It's just like saying "your-favorite-distro was not detected until telnetd was installed and root password was set to 'password'". Stupid.
And yes, I am a Vista user.
Completely inconsistent (Score:5, Insightful)
Disabling the firewall on Vista was rather foolish and not enabling it on OS X, while making other changes equally so. That being said, Apple is still nuts for not enabling the firewall by default (technically it is enabled and running, but its configuration is empty).
Re: (Score:2)
Re: (Score:2)
Yep. This is what 10.4.x has it set to when the firewall is 'off':
Re: (Score:2)
Re: (Score:2)
Thanks. Though your answer and the AC's answer above contradict each other I get the feeling that yours is correct. From the first rule, I assume that OSX also uses natd and has it on but doing nothing by default too? It seems weird to me to have both the ipfw and natd on by default...and doing nothing. In FreeBSD, I can load them up and shut them down on the fly after boot-up. Can you not do this in OSX? Forgive my stupid questions. I really need to get a hold of one of the G5s we have here and work and play with it.
natd is running on this system, but I also have Internet Sharing enabled. I don't know if turning it off actually disables natd or just adjusts the settings (have to try it some time). I do know that if I enable the firewall, Internet Sharing stops functioning, so the firewall rules are not modified by the presence of Internet Sharing. I am working on a custom ipfw config to correct this. To me, this is a big Apple screwup, since their is no mention anywhere in the settings that the firewall does not or s
Re: (Score:2)
Wait, why am I cringing? (Score:4, Interesting)
The upshot seemed to be that even when the examiner intentionally turned on every service and did not enable the firewall, the only vulnerabilities found were two timing-based user-enumeration attacks.
That's... that's the big shocking secret? That if I go out of my way to ask my system to be considerably less secure than its default configuration, Mallory out there can find out the names of accounts on my system? Quick, somebody get me some smelling salts!
Cringe? (Score:5, Insightful)
Then somehow this
The immediately following sentence
So how does "straight-out-of-box vulnerable" and "after enabling built-in services" make any sense?
Sure there's pre-patch vulnerabilities for all 2 year old OS' out there... hardly makes me cringe however.
Re: (Score:2)
For example, the result after they did that on FreeBSD 6.2 was "None of the service binaries exhibited any vulnerabilities to remote exploits."
So while its not a valid part of a "default-install-only" test, it is an interesting benchmark of what if you then run some common services.
In general, however, you're right, there are methodology changes they could have made to make the testing much more
Hardware firewall is your friend (Score:2, Insightful)
Either way, if you configure it to block incoming connections to the new machine and the rest of your network is uninfected and well-protected, you can almost always download patches safely.
Some OSes even come with inbound ports turned off by default using the built-in firewall.
If this is you, then "remotely exploitable vulnerability on an unpatched system" is pretty meanin
Re: (Score:2)
You can skip the hardware firewall if you use a better OS.
Re: (Score:2)
Re: (Score:2)
So-called 'software' firewalls that run on the same machine they are protecting are crap.
A properly configured bsd or linux box doesnt need a seperate firewall.
No comptetent person with any clue whatsoever would ever consider putting a Windows box on the net without a seperate ("hardware") firewall protecting it, assuming they have any reason to run a Windows box to begin with. (Eg their boss/spouse/
Re: (Score:2)
We need a comparison of pro-active security (Score:2, Interesting)
For example, WinXP SP2 introduced stack randomization and various other enhancements. Solaris has an option to mark parts of the stack non-executable. Third-party extensions like grs
Dangerous "Out of the Box" (Score:2)
I bet if I went and bought a nice new shiny sports car, and drove 200 mph into a brick wall, I would die. Geez! How insecure is that? I mean after all I have to engage the seatbelt? It wasn't engaged when I bought
I find his methodology bizarre. (Score:4, Insightful)
He also included classic Mac OS in the test, even though this isn't even installed out of the box on any Mac, and won't run on any Mac shipped in at least three years. Why didn't he include Windows 98 and NT4 in his collection as well?
While there are an enormous variety of operating systems to choose from, only four "core" lineages exist in the mainstream - Windows, OS X, Linux and UNIX.
There's six mainstream lineages left, and they're NT5, 4BSD, Linux, System V, VMS, and whatever IBM's calling their systems architecture this week.
Mainstream OS architectures (Score:2)
There's six mainstream lineages left, and they're NT5, 4BSD, Linux, System V, VMS, and whatever IBM's calling their systems architecture this week.
IBM kinda has two, right? You probably mean z/OS [wikipedia.org] IBM's mainframe OS successor to MVS, but there's also i5/OS aka OS/400 [wikipedia.org] which has a unique and interesting (imho) object-oriented system architecture. Last I checked IBM sold $1 billion of the latter every year (OS+hardware). Oh, and there's VM/CMS [wikipedia.org] which is what all th
Vista? (Score:3, Interesting)
The list of open ports was THREE.
No vulnerablities were detected even with the firewall totally OFF.
Seems like (for now) Vista wins this one.
Re: (Score:2)
Vista wins?
How exactly did Vista do better than the desktop setup of OSX, Fedora, Suse or Ubuntu? Heck, even FreeBSD with all it's 12+ services running and no firewall had no vulnerabilities. If you consider being as good as eve
He should have tested the mouse as a security risk (Score:2, Informative)
I did see where McAfee said that Firefox on Windows blocked this so I'm only guessing that it's yet another Windows w/Internet Explorer flaw since one of the temp fixes is to turn off html rendering i
Oracle on classic Mac OS? I don't think so. (Score:3, Funny)
Since Oracle 9i doesn't even run on Mac OS 9.2.2, I don't think this is likely to be a big concern.
Re: (Score:2)
And they didn't even mention Rendezjour? (Score:2)
Re:SAY IT AINT SO JOE (Score:4, Funny)
Re: (Score:2, Funny)
Re:SAY IT AINT SO JOE (Score:4, Funny)
Re: (Score:2, Insightful)
One you turn on every bell and whistle you *might* disclose usernames on the system or be able to crash daemons, but non appear to allow a virus to propagate.
Re: (Score:2)
Probably it's something to do with Mac's add campaign pointing out all the flaws in Windows, while implying that Mac's have no flaws. People love to pick holes in pompous statements. It's sort of like the US pointing their finger at Chinas human rights abuses all the time and then the US wondering why people get excited when others show the US is also abusing human rights. (Disclaimer: I don't believe that operating system flaws
Re:What about 10.4.9? (Score:4, Informative)
I ran nessus 2.2.8 (on Ubuntu Feisty) with all included plugins active, against an up-to-date MacOSX 10.4.9 system which is sitting just to my right. The system has Windows Sharing, Remote Login, and FTP Access turned on. The closest it came to a vulnerability was with netbios-ns (137/udp) and it said "If you do not want to allow everyone to find the NetBios name of your computer, you should filter incoming traffic to this port." Hope this is something like what you wanted to know.
Re: (Score:2)
Well, I should just make someone else do it, but okay. Methodology: I set a wacky (keyboard-smashing) password for Xgrid, because leaving no password would be stupid. Everything else has default options unless I needed to set them before (which is to say, I MIGHT potentially have chosen non-default options for ssh, ftp, and normal sharing. But I don't think I did. Not very scientific but it's in the interest of full disclosure.
Open port |service!= vulnerability (Score:2, Informative)
This was the most stupid and moot article in ages on
Re: (Score:2)
Re: (Score:2)
For all other geeks, there's OpenBSD :-)
[Sorry, couldn't resist!]
Re: (Score:2)
This is certainly more insightful than flamebait. TFA is a flawed comparison of OSes that appears designed to make UNIX variants, and in particular Linux, look good. It actually works against the whole movement to blindly support these studies, or moderate comments like the parent in a purely partisan way without actually thinking about them in context. It supports the the view that Linux users are irrational zealots.
Can somebody with mod points please, in the absence of a +0 Uncomfortable But True moderat