lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1303185764.2628.519.camel@bruno> Date: Tue, 19 Apr 2011 00:02:44 -0400 From: Lists <lists@...twareintegrity.com> To: full-disclosure@...ts.grok.org.uk Subject: Windows Synchronization Object Vulnerabilites in Antivirus Suites Abstract In 2009 we examined the effects of manipulating synchronization objects in security software suites frequently found on personal computers running Windows XP and Vista. The synchronization objects were mutexes and events, and the security software included products from AVG, Avast, Avira, BitDefender, BullGuard, CheckPoint, Eset, F-Prot, F-Secure, Kaspersky, McAfee, Microsoft (Security Essentials), Norman, Norton, Panda, PC Tools, Quick Heal, Symantec, and Trend Micro. The examinations revealed that nearly all suites suffered non-trivial faults originating from both standard and administrator accounts. The faults ranged from simple denial of service affecting the UI console and definition update service to scanner crashes and surreptitious suite shutdown. http://www.softwareintegrity.com/documents/Old-Dogs-and-New-Tricks.pdf _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists