[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] Windows Synchronization Object Vulnerabilites in Antivirus Suites
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: [Full-disclosure] Windows Synchronization Object Vulnerabilites in Antivirus Suites
- From: Lists <lists@xxxxxxxxxxxxxxxxxxxxx>
- Date: Tue, 19 Apr 2011 00:02:44 -0400
Abstract
In 2009 we examined the effects of manipulating synchronization
objects in security software suites frequently found on personal
computers running Windows XP and Vista. The synchronization objects
were mutexes and events, and the security software included products
from AVG, Avast, Avira, BitDefender, BullGuard, CheckPoint, Eset,
F-Prot, F-Secure, Kaspersky, McAfee, Microsoft (Security Essentials),
Norman, Norton, Panda, PC Tools, Quick Heal, Symantec, and Trend
Micro.
The examinations revealed that nearly all suites suffered non-trivial
faults originating from both standard and administrator accounts. The
faults ranged from simple denial of service affecting the UI console
and definition update service to scanner crashes and surreptitious
suite shutdown.
http://www.softwareintegrity.com/documents/Old-Dogs-and-New-Tricks.pdf
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/