Archive Formats Kill Antivirus Products 115
nemiloc sends us to the F-Secure blog for breaking news about widespread vulnerabilities in programs that process archive files: "The Secure Programming Group at Oulu University has created a collection of malformed archive files. These archive files break and crash products from at least 40 vendors — including several antivirus vendors... including us." Here is test material from OUSPG and a joint advisory from Finnish and English security organizations. It isn't news that security products can have have security vulnerabilities. What makes this advisory important is that antivirus software is a perfect target. It is run in critical places with high privileges and auto-updates to keep versions coherent.
That's nothing (Score:5, Funny)
Re: (Score:2, Funny)
Re: (Score:2)
Secure Platform without Anti-virus (Score:5, Insightful)
I don't need to mention names, you know.
Re:Secure Platform without Anti-virus (Score:5, Funny)
Re: (Score:1)
Re:Secure Platform without Anti-virus (Score:5, Insightful)
Your 'solution' may work for some, but probably not for most, and for the rest of us, thats what these articles are posted for!
Re:Secure Platform without Anti-virus (Score:5, Insightful)
Re: (Score:1)
Re: (Score:3, Informative)
Re: (Score:3)
Seriously. I love Linux, but treating people like they're morons for having to support a Windows system is unrealistic.
Re: (Score:1)
There is only one good use for a small town
There is only one good thing about small town
You know that you want to get out
When you're growing up in a small town
You know you'll grow down in a small town
There is only one good use for a small town
You hate it and you'll know you have to leave
-Lou Reed
Re: (Score:3, Insightful)
Unless your employer is prepared to pay for code to be written specifically for every little business requirement that no half-decent Free solution exists for, I defy you to avoid vendor lock-in. Commercial applications with fully documented data schemas are more or less non-existent.
Email solutions are easy. They've been done to death. So have office applications - wordprocessors, spreadsheets, that kind of stuff.
Groupware is harder, but not impossible. It becomes muc
Re:Secure Platform without Anti-virus (Score:5, Insightful)
But you have a point that many people, yourself included, are stuck with Windows. It wouldn't be easy to migrate. Much more convenient to buy some crappy virus scanner and keep the plates spinning.
Re: (Score:1)
I'm not sure whether to laugh or cry.
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
I have heard this mentioned a few times. Where are these binary PST files? Is that where the exchange server is storing everything in? One big PST file?
I know that one my home system we don't have PST files on the workstations, all the data is stored on the exchange server and I cannot find any PST files there. I need to find them so I can get them backed up. Otherwise the Exchange backup's that I do make probably aren't worth much.
Re:Secure Platform without Anti-virus (Score:5, Informative)
Re: (Score:1)
Re: (Score:1)
Another way is to put the psts on the file server and either use a backup software with open file capability or force logouts to disconnect users who leave their Outlook running during backups.
Yet another way is to configure an archive mailbox on Exchange and have a client pop it off to a single pst to backup. This way you don't hav
Re: (Score:1, Troll)
Re: (Score:1)
I guess it all comes down to what you're used to. IMHO both are adequate at what they do, it's just that none of us likes to change / turn-away of what he knows best.
PS: a "few" years ago (around 2002 I think) we spent several months working with some (very smart)
Re: (Score:1)
Re: (Score:2)
Re: (Score:3, Insightful)
Re: (Score:3, Interesting)
hmm, actually, if only for virus protection... (Score:2)
Re: (Score:1)
http://www.sidereel.com/The_Jetsons/_watchlinkviewer/1 [sidereel.com]
Re: (Score:3, Funny)
Re: (Score:1)
Re: (Score:1, Troll)
Re: (Score:2, Interesting)
Re:Secure Platform without Anti-virus (Score:5, Insightful)
It's unfair to pretend non-MS solutions are somehow expensive because it's so hard to break free from MS once you allowed yourself to get hooked into their proprietary world. You could just as well have developed your enterprise apps in something other than ASP, haven't you?
OK, I know I'm probably barking up the wrong tree here - probably it's not *your* fault after all. But I guess you know what I'm trying to point out.
Re: (Score:2)
Even if Outlook/Exchange were totally a black box, you could still write a screen scraper (like UI testing apps do) and export the data as maildir + data which could be stored in a DB, for anything not email related (calendar, etc).
You might have a huge clunky 500kloc business system that is essential to the company. But could it be replaced by an off-the-shelf CRM, issue-tracking, and a much smaller leaned reimplem
Re: (Score:1)
Re: (Score:1)
What is this software that you run? Even Microsoft's own solution, Dynamics AX, runs and is fully supported on Oracle.
Re: (Score:2)
Re:Secure Platform without Anti-virus (Score:5, Funny)
http://www.ld8.org:6502/ [ld8.org]
Or a list of other older Apple hardware http://www.ld8.org/servers/servers_apple2.html [ld8.org]
Layne
Re: (Score:2)
Re: (Score:2)
Serial connection was available.....make a null modem over to a custom gateway....
Layne
Re: (Score:3, Informative)
Re: (Score:3, Insightful)
Re: (Score:2)
Actually the article linked to stated that Symantec tested all their products against the bug, and found that it
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Oddly enough, people don't care about the OS. They care more about the data files in their home directory than anything else.
Re: (Score:2)
Question (Score:2, Funny)
Re: (Score:1)
Re: (Score:1)
why bother checking archives anyways? (Score:1)
Re: (Score:2, Informative)
There's breakage and there's breakage (Score:5, Informative)
1. "I had an exception processing file ABC.ZIP, skipping file,"
2. Crashing and dying without handling the exception, and
3. Being exploited due to an unexpected condition.
The first lets viruses hide in carefully-mis-crafted archives.
The second lets viruses deactivate antivirus software.
The third lets viruses 0wn j00.
Some AV software is smart enough to log instances of #1.
Re: (Score:1)
0. Exception processing hotbabe.zip, removing attachement.
Re:There's breakage and there's breakage (Score:5, Interesting)
Very little software in practice is that smart. But with AV, you know you're at war with the file you're scanning. Any AV vendor caught by this should be embarrased.
Re: (Score:1)
Re: (Score:2)
Re: (Score:2, Informative)
Re: (Score:3)
As a footnote, there are no such buffer overrun vulnerabilities in my ARC program, which is now more than 22 years old.
http://sourceforge.net/projects/arc [sourceforge.net]
Proofread? (Score:1)
While two negatives make a positive, two positives do not make a negative.
Re:Proofread? (Score:5, Insightful)
Re: (Score:1)
Re:Proofread? (Score:5, Funny)
Re: (Score:2)
Re: (Score:2)
secure(X) = secure(a) ^ secure(b) ^ secure(c)
Re: (Score:2)
"I'm positively furious at you young man, and I'm positive your father is going to take the belt to you when he hears about this!"
Created`some rather negative feelings in me, growing up... but otherwise I agree.
Re: (Score:1)
Archive Formats Kill Antivirus Products (Score:1)
Re: (Score:1)
Old Problem (Score:5, Informative)
Re: (Score:3, Insightful)
If correcting the repercussions of the incident takes less time than the total time lost by doing things the correct way, then I will take the fast way, please.
Re: (Score:3, Insightful)
That is the same thing that says, do I leave an unsecured wireless AP, or a lightly secured WEP AP that shows I did at least due dilligence?
For personal Machines, I'd take the fast way, for shure, assuming data is backed up regularly.
For corporate machines,(in general,Caveat emptor, and risk assesment would need to be performed on a per machine basis.) I wouldn't trust an icecubes chance in hell (hey, what if Satan has a freezer?), it'd
Re: (Score:1)
Older than you think [mitre.org], perhaps.
What really gets me is that every couple of years the University of Oulu Secure Programming Group comes out with another few dozen application vulnerabilities they've found by just fuzzing a new protocol. First they did SNMP, the ASN (part of OpenSSL, to a first approximation), H.323 ... I don't know who's got tenure over there, but damn! I'm glad they're on our side.
Re: (Score:1)
Click here to install our crack for xyz software ( test material from OUSPG ) ;) since we are great coders.
If that did not work click here for our other version ( install virus of choice )
Small chance you will need this version
Huh, my AV software just crashed, my IDS is throwing a fit, and my registry monitor is blocking a bunch of changes to the startup keys. Something tells me I don't want to run this installer. Guess I need to reset this VM instance back to baseline.
isn't this where unix shines (Score:2)
for most files theres no need to give the scanner an privaleges
only needs read access to itself and system files 90% of the time.
in fact even on windows, why do virus scanners need high privileges?
Re: (Score:2)
Re: (Score:1)
I always a
Re: (Score:2)
Re: (Score:2)
a root outlook looker, looks at outlook (but the looker is small so hard to exploit)
a non-root unzip, unzips and passes it on
a non-root scanner, to scan the file then pass on the conclusion
a root cleaner, to take any actions (may not even need root)
by reducing the code that runs with root privileges you reduce the chances of an exploit in root code.
Re: (Score:3, Informative)
Typically, on a Windows system, antivirus software will embed itself into the operating system fairly deeply. They usually scan all file I/O in real-time, watch memory for suspicious things, and sandbox much of what is run. It isn't as simple as just scanning files here and there. Most Windows antivirus software installs itself (or parts of itself) as a service and starts running even before the shell comes up.
Hrm (Score:5, Informative)
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0308 [nist.gov]
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0309 [nist.gov]
Re: (Score:2, Informative)
Re: (Score:1)
They do mention using using ICEOWS to decompress under Windoze, but don't endorse it or guarantee it will work:
"One suitable tool for Windows environment is ICEOWS, available at no cost. Note that each x.tar.bz2 package is first decompressed to a x.tar file, which is then similarly decompressed into a directory x containing the files. Note that OUSPG neither endorses any decompress
Bad programming (Score:3, Interesting)
Surprise Surprise (Score:1)
It has been years since the viral jpeg, pdf, etc, etc, and viruses have been getting packed in archival formats to avoid detection for ages. I can't say this is earth shatteringly surprising news.
Confused as to the severity of this. (Score:2)
Also if you need to unzip a random file for the virus to release, then how is that much different from your typical
That's been going on for ages!!! (Score:5, Interesting)
The next version did fix that finally...for pkzip.
Using social engineering that is rather inept by todays standards I convinced several people on usenet to not read the text telling that it could cause problems but to just blindly open the doubly zipped file (it gets smaller when doubly zipped a certain way so I made it 2G to start).
I did the same thing with PGP which could allow one to kill an encrypted anonymous remailer and I also nailed several people by posting the PGP message with a passphrase. PGP compresses files prior to encryption. I didn't mess with the remailer without asking permission. The person running it was a bit surprised.
Linux commands:
dd if=/dev/zero of=hi bs=1024 count=200512
zip hi.zip hi
Result -rw-r--r-- 1 bogus bogus 199411 2008-13-48 18:04 hi.zip
zip -9 ho.zip hi.zip
Result -rw-r--r-- 1 bogus bogus 846 2008-30-81 18:13 ho.zip
I'm not sure why but using -9 to start does not make the original super small it only works the second time.
If you want to assault a fractal compressor, just insert a non-finite automata and have at them. You get points if it's video and draws frame after frame of something inappropriate.
Re: (Score:1)
I theory, incre
Re: (Score:2)
It's not lupus? (Score:1)