Jump to content

Recommended Posts

Posted

Malwarebytes says it will take about a month to deploy a patch to fix vulnerabilities found by Google's Project Zero bug hunters.

 

a37f5611d5e566fd40e5258cf3f5a268.jpg

Malwarebytes has now launched a bug-bounty program, offering up to $1,000 to researchers who report flaws in its products.

 

Malwarebytes says it could take three to four weeks to fix security flaws found by Google in its popular anti-malware product .

 

Google's bug-hunting squad, Project Zero, first notified the internet-security firm of the four vulnerabilities in November but on Tuesday went ahead and detailed the separate flaws and attack methods in a redacted report published on the group's bug repository.

 

Project Zero researcher Tavis Ormandy found that the Malwarebytes client was fetching malware signature updates over unencrypted HTTP, leaving those definitions open to tampering in a man-in-the-middle attack.

 

The researcher only probed Malwarebyte's consumer edition. However, the bugs also affect the company's premium product.

 

Marcin Kleczynski, CEO and founder of Malwarebytes, said enabling 'self-protection' under settings should mitigate the problem while it works on a proper fix.

 

Malwarebytes recently noted that its software was running on 250 million machines worldwide.

 

Project Zero offers vendors 90 days to fix flaws and alert customers before publishing details of bugs its researchers have found. Malwarebytes appears to have been given an extension, with its grace period technically having expired on January 11.

 

Kleczynski apologized to users for the flaws and, in response to Ormandy's efforts, has launched a bug-bounty program, offering up to $1,000 to researchers who report flaws in its products.

 

"Unfortunately, vulnerabilities are the harsh reality of software development," Kleczynski said. "A vulnerability disclosure program is one way to accelerate the discovery of these vulnerabilities and empower companies like Malwarebytes to fix them."

 

Bugs in security products do pose a unique threat to users due to the sensitive permissions they have.

 

They have also come under the spotlight following a report by The Intercept that Britain's GCHQ had sought a warrant to probe Kaspersky antivirus for security flaws to aid its own hacking efforts.

 

The NSA has also taken a keen interest in non-US antivirus products, including Kaspersky, ESET, and F-Secure.

 

Malwarebytes anti-malware is the latest security software to be lanced by Ormandy, who has found serious flaws in products from AVG, Kaspersky, FireEye, Trend Micro, ESET, Sophos, and most recently in Comodo's Chromodo Chrome fork.

 

In all cases, products that are designed to protect users from threats exposed them to further risks through insecure code.

 

 

 

Source:

http://www.zdnet.com/article/google-lays-bare-security-flaws-in-anti-malware-product-with-250-million-users/#ftag=RSSbaffb68

76c90dd0e79a714317a8daeecc1584d2.png

  • FPCH Admin
Posted
Wow! This is kind of disconcerting. I rely heavily on Malwarebytes.

~I know that you believe you understand what you think I said, but I'm not sure you realize that what you heard is not what I meant.~

~~Robert McCloskey~~

Posted
"CEO and founder of Malwarebytes, said enabling 'self-protection' under settings should mitigate...." He didn't mention that 'self protection' is only available in the paid version.
Posted
He didn't mention that 'self protection' is only available in the paid version

I think the reason for this is that the premium version has auto updating, so will connect to the internet a few times a day.

This is obviously a greater risk than manually updating once or twice a week.

 

I've looked through their website and can't find any reference to the free version though.

But it seems a new version is on the way.

 

In early November, a well-known and respected security researcher by the name of Tavis Ormandy alerted us to several security vulnerabilities in the consumer version of Malwarebytes Anti-Malware.

 

Within days, we were able to fix several of the vulnerabilities server-side and are now internally testing a new version (2.2.1) to release in the next 3-4 weeks to patch the additional client-side vulnerabilities.

76c90dd0e79a714317a8daeecc1584d2.png

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...