2010年3月14日 星期日

FW: NEWSBANK: More Anti-Virus Fail


-------------------------------------------
From: Paul Ferguson (RD-US)
Sent: Monday, March 15, 2010 2:18:16 PM
To: Joahnna Hipolito (AV-PH)
Cc: Newsbank
Subject: RE: NEWSBANK: More Anti-Virus Fail
Auto forwarded by a Rule


Good thing we’re not an AV company, right?

 

-ferg

 

--

"Fergie", a.k.a. Paul Ferguson

 Threat Research,

 CoreTech Engineering

 Trend Micro, Inc., Cupertino, California USA

 

From: Joahnna Hipolito (AV-PH)
Sent: Sunday, March 14, 2010 11:17 PM
To: Newsbank
Subject: NEWSBANK: More Anti-Virus Fail

 

http://www.informationweek.com/blog/main/archives/2010/03/more_antivirus.html;jsessionid=5IL4ZJYMXQFCRQE1GHPCKHWATMY32JVN?cid=RSSfeed_IWK_ALL

 

More Anti-Virus Fail

Posted by George Hulme, Mar 13, 2010 10:06 PM

By focusing on threats, rather than vulnerabilities, those who rely on anti-virus software to stop rapidly evolving attacks are simply asking for their systems to be owned.

If you're looking for a nail to drive into the coffin of traditional anti-virus software, you need to look no further than the latest report from NSS Labs which found that only one anti-virus application out of seven the independent testing firm evaluated caught multiple exploits and payloads that targeted the vulnerability used to attack Google late last year in the so-called "Operation Aurora" incidents. The vulnerability in those attacks was a flaw in Microsoft Windows Internet Explorer known as CVE-2010-0249.

For its testing NSS Labs created variants of the Operation Aurora attack and tested the anti-malware software to see which of the seven products stopped the exploits and malicious code payloads.

The tested applications include AVG Internet Security, version 9.0.733; ESET Smart Security 4, version 4.0.474.0; Kaspersky Internet Security 2010, version 9.0.0.736; McAfee Internet Security 2010 with SecurityCenter, version 9.15.160; Norton Internet Security 2010, version 17.0.0.136 (Symantec); Sophos Endpoint Protection for Enterprise – Anti-Virus version 9.0.0; and Trend Micro Internet Security 2010, version 17.50.1366.0000.

The only anti-malware application to catch multiple attacks aimed at the vulnerability was the McAfee product. Here's what NSS Labs had to say about their results in their statement:


Given the level of visibility of the attack and the time that has passed since its initial discovery, it was thought that most, if not all, of the products would cover the vulnerability. However, only one out of seven tested products correctly thwarted multiple exploits and payloads, demonstrating vulnerability-based protection (McAfee).

This afternoon, Vikram Phatak, CTO at NSS Labs discussed the testing and demonstrated the Operation Aurora exploit during the BSidesAustin event held at the Norris Conference Centers. "There are many ways to possibly exploit a vulnerability, and rather than focusing on every attack method, vendors need to focus on [shielding] the vulnerability itself," he said.

Makes sense, whenever possible, doesn't it? Why create specific shields to block every attack variant when it's possible to create one shield that blankets a vulnerability from all attack variants aimed at it.

NSS Labs full report and test results is available here.

 

沒有留言: