Security software may be posing security risks

Published 27 November 2007

Security maven Thierry Zoller says that file-parsing bugs in security software could become a big problem: Increasing your use of antivirus software only increases the chances that you could be successfully attacked

Now, here is problem: Is it the case that the software we are using to protect ourselves from online attacks is becoming a liability? Security maven Thierry Zoller believes so. Robert McMillan writes in PCWeek that for the past two years, the security engineer for Oberursel, Germany-based n.runs AG has taken a close look at the way antivirus software inspects e-mail traffic, and he thinks companies that try to improve security by checking data with more than one antivirus engine may actually be making things worse. Why? Because bugs in the “parser” software used to examine different file formats can easily be exploited by attackers, so increasing your use of antivirus software only increases the chances that you could be successfully attacked. Antivirus software must open and inspect data in hundreds, if not thousands, of file formats. One bug in the software that does this can lead to a serious security breach.

Zoller and his colleague Sergio Alvarez have been looking into this issue for the past two years and they have found more than eighty parser bugs in antivirus software, most of which have not yet been patched. The flaws they have found affect every major antivirus vendor, and many of them could allow attackers to run unauthorized code on a victim’s system, Zoller said. “People think that putting one AV engine after another is somehow defense in depth. They think that if one engine doesn’t catch the worm, the other will catch it,” he said. “You haven’t decreased your attack surface; you’ve increased it, because every AV engine has bugs.” Attackers have exploited parsing bugs in browsers for years now, but with some success, Zoller believes that because antivirus software runs everywhere, and often with greater administrative rights than the browser, these flaws could lead to even greater problems in the future. The bottom line, he says, is that antivirus software is broken. “One e-mail and boom, you’re gone,” he said.

Note that research into parsing bugs has been spurred by a heightened focus in recent years on “fuzzing” software, which is used by researchers to flood software with a barrage of invalid data in order to see if the product can be made to crash. This is often the first step toward discovering a way of running unauthorized software on a victim’s machine. For example, a parsing bug in the way the Safari browser processed .tiff graphic files was used recently to circumvent Apple’s strict controls over what software may be installed on the iPhone. Zoller says he has been criticized by his peers in the security industry for “questioning the very glue that holds IT security all together,” but he believes that by bringing this issue to the forefront, the industry will be forced to address a very real security problem. Between 2002 and 2005, nearly half of the vulnerabilities which were discovered in antivirus software were remotely exploitable, meaning that attackers could launch their attacks from anywhere on the Internet. Nowadays, that percentage is close to 80 percent, he said.

Remember the Daily Wire’s unofficial motto: Where there is a security need, there is a business opportunity. Indeed. Zoller’s company sees a business opportunity here. N.runs is building a product, code-named ParsingSafe, which will help protect antivirus software from the kind of parsing attacks that he has documented. Russ Cooper, a senior scientist with Verizon Business, had some criticism for the work of n.runs. “The research almost appears to be goading criminals into ‘getting better’ at attacking vulnerabilities … hardly helpful,” he told McMillan and an instant message. “There’s no doubt that the list of vulnerabilities they have already published in security products looks daunting. However, historically, we have not seen this type of vulnerability exploited.” Cooper agrees that antivirus file parsing vulnerabilities do pose a risk, but he said there are several reasons they have not yet been the focus of widespread criminal attacks. For one, criminals are already being effective enough with their current tactics, such as sending malicious e-mail attachments. A second reason is that security software tends to get more scrutiny, meaning that any vulnerability that was being exploited would be quickly patched, and that any criminal involved in an exploit would be more likely to be caught. Security vendors have long known about vulnerabilities in their software, said Marc Maiffret, chief technology officer with eEye Digital Security. “Security software is just as vulnerable as any other software,” he said via instant message. “We all hire the same developers that went to the same colleges as Microsoft and learned the same bad habits.”