starbuck Posted February 3, 2016 Posted February 3, 2016 Malwarebytes says it will take about a month to deploy a patch to fix vulnerabilities found by Google's Project Zero bug hunters. Malwarebytes has now launched a bug-bounty program, offering up to $1,000 to researchers who report flaws in its products. Malwarebytes says it could take three to four weeks to fix security flaws found by Google in its popular anti-malware product . Google's bug-hunting squad, Project Zero, first notified the internet-security firm of the four vulnerabilities in November but on Tuesday went ahead and detailed the separate flaws and attack methods in a redacted report published on the group's bug repository. Project Zero researcher Tavis Ormandy found that the Malwarebytes client was fetching malware signature updates over unencrypted HTTP, leaving those definitions open to tampering in a man-in-the-middle attack. The researcher only probed Malwarebyte's consumer edition. However, the bugs also affect the company's premium product. Marcin Kleczynski, CEO and founder of Malwarebytes, said enabling 'self-protection' under settings should mitigate the problem while it works on a proper fix. Malwarebytes recently noted that its software was running on 250 million machines worldwide. Project Zero offers vendors 90 days to fix flaws and alert customers before publishing details of bugs its researchers have found. Malwarebytes appears to have been given an extension, with its grace period technically having expired on January 11. Kleczynski apologized to users for the flaws and, in response to Ormandy's efforts, has launched a bug-bounty program, offering up to $1,000 to researchers who report flaws in its products. "Unfortunately, vulnerabilities are the harsh reality of software development," Kleczynski said. "A vulnerability disclosure program is one way to accelerate the discovery of these vulnerabilities and empower companies like Malwarebytes to fix them." Bugs in security products do pose a unique threat to users due to the sensitive permissions they have. They have also come under the spotlight following a report by The Intercept that Britain's GCHQ had sought a warrant to probe Kaspersky antivirus for security flaws to aid its own hacking efforts. The NSA has also taken a keen interest in non-US antivirus products, including Kaspersky, ESET, and F-Secure. Malwarebytes anti-malware is the latest security software to be lanced by Ormandy, who has found serious flaws in products from AVG, Kaspersky, FireEye, Trend Micro, ESET, Sophos, and most recently in Comodo's Chromodo Chrome fork. In all cases, products that are designed to protect users from threats exposed them to further risks through insecure code. Source: http://www.zdnet.com/article/google-lays-bare-security-flaws-in-anti-malware-product-with-250-million-users/#ftag=RSSbaffb68 Quote
FPCH Admin allheart55 Cindy E Posted February 3, 2016 FPCH Admin Posted February 3, 2016 Wow! This is kind of disconcerting. I rely heavily on Malwarebytes. Quote ~I know that you believe you understand what you think I said, but I'm not sure you realize that what you heard is not what I meant.~ ~~Robert McCloskey~~
Bill M. Posted February 3, 2016 Posted February 3, 2016 "CEO and founder of Malwarebytes, said enabling 'self-protection' under settings should mitigate...." He didn't mention that 'self protection' is only available in the paid version. Quote
starbuck Posted February 3, 2016 Author Posted February 3, 2016 He didn't mention that 'self protection' is only available in the paid version I think the reason for this is that the premium version has auto updating, so will connect to the internet a few times a day. This is obviously a greater risk than manually updating once or twice a week. I've looked through their website and can't find any reference to the free version though. But it seems a new version is on the way. In early November, a well-known and respected security researcher by the name of Tavis Ormandy alerted us to several security vulnerabilities in the consumer version of Malwarebytes Anti-Malware. Within days, we were able to fix several of the vulnerabilities server-side and are now internally testing a new version (2.2.1) to release in the next 3-4 weeks to patch the additional client-side vulnerabilities. Quote
Recommended Posts