Top security suites fail exploit tests

Security software suites -- including popular programs from McAfee, Symantec, and Trend Micro -- don't protect users from real-world exploits, Secunia warns

Security software suites don't protect users from real-world exploits, a bug tracking company charged today after launching 300 test attacks against a dozen programs, including popular software from McAfee, Symantec, and Trend Micro.

"The Internet security suites are marketing themselves as the one solution users need to be safe online," said Thomas Kristensen, chief technology officer at Secunia, which ran the tests. "In our opinion, that's just not true."

[ Learn how to secure your systems with Roger Grimes' Security Adviser blog and newsletter, both from InfoWorld. ]

Secunia sicced hundreds of vulnerability exploits -- some proof-of-concept code that triggered a vulnerability, others that included payloads -- on 12 suites, including Symantec's Norton Internet Security 2009, Microsoft Corp.'s Windows Live OneCare, AVG Technologies' Internet Security 8.0, and McAfee Inc.'s Internet Security Suite 2009. The attack code was delivered by files of various formats, including Office documents and malformed images, and by malicious Web sites that triggered browser and ActiveX bugs. The target was a Windows XP SP2 machine missing "certain patches and with a number of vulnerable programs," according to Secunia.

While Symantec's Norton Internet Security 2009 took honors, it detected only 64 out of 300 exploits, or just 21 percent of the total. Even so, that beat most rivals by substantial margins. Trend Micro's Internet Security 2008, for example, only detected 2.3 percent of the exploits, while McAfee's Internet Security Suite 2009 identified 2 percent and Microsoft's OneCare spotted just 1.8 percent of the exploits.

The reason why current security suites had such trouble detecting the 300 exploits, Kristensen explained, is that anti-virus software vendors are geared toward cranking out signatures for hacker payloads: the worms, Trojan horses, and spyware that are identified in the wild, given names, and then spotted by adding a new detection "fingerprint" to the software.

"They don't focus on detecting vulnerabilities, they focus on detecting the payload," Kristensen said. "But the problem with detecting the payload is that you're always behind [the hackers]. It's easy for the bad guys to create a new payload that's not detected by the scanning mechanisms and current signatures."

In order to craft a signature for a specific payload, security companies must first capture a sample, analyze the malware, and write a detection fingerprint. Then they must push that new signature to users. The process, said Kristensen can take hours at best, and then must be repeated as soon as a new piece of malware is bundled with an exploit.

But by looking for vulnerability exploits rather than for payloads, argued Kristensen, security software could stop multiple pieces of malware with just one signature, essentially making a more efficient defense in the long run.

"If there's a vulnerability in [Microsoft] Office and someone is exploiting that in an Office document, you'll be able to block that attack with just one signature," he said, no matter how many different payloads hackers may try to load into a vulnerable PC. "It's a much better way, we think, even though it's somewhat more time consuming to come up with a vulnerability signature."

Although Secunia sells its vulnerability research and proof-of-concept exploits to legitimate security vendors, Kristensen maintained that was not the reason why the company tested the 12 suites. Instead, he said, the take-away should be to patch, patch promptly, and patch all software, not just the operating system.

"Security software alone isn't sufficient" to protect a PC," Kristensen said. "People need to patch all their programs. Patching is absolutely necessary, and not just the main programs, but third-party software as well."

Secunia has posted a paper that describes its suite testing procedure and lists results on its site (download PDF).

Computerworld is an InfoWorld affiliate.

This story, "Top security suites fail exploit tests" was originally published by Computerworld .

Recommended
Join the discussion
Be the first to comment on this article. Our Commenting Policies