Risk
8/17/2010
03:24 PM
George V. Hulme
George V. Hulme
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Anti-Virus Suite Protection? Not Much

It's no secret that anti-virus software doesn't do much to protect you against new and rapidly moving viruses, so it shouldn't come as much of a surprise that these suites don't do much good defending you against exploit code, either. A fresh evaluation from NSS Labs reveals just how vulnerable you really are.

It's no secret that anti-virus software doesn't do much to protect you against new and rapidly moving viruses, so it shouldn't come as much of a surprise that these suites don't do much good defending you against exploit code, either. A fresh evaluation from NSS Labs reveals just how vulnerable you really are.One of the reasons I've always taken interest in NSS Labs reports is because they are independently conducted and not funded by the security firms tested. In this report, NSS Labs tested the leading corporate anti-virus and end-point anti-virus applications on their ability to protect the host from exploit attacks. Exploit code is software that leverages application vulnerabilities to gain access. Many attacks today are in fact exploit-based attacks that are delivered in e-mail and malicious or compromised web sites and target web browsers, plug-ins, and client-side applications. These are the kinds of attacks that made the now famous Operation Aurora attack on Google and many other U.S. companies possible, and were heavily reported on earlier this year.

To conduct this test, NSS Labs took 123 common and already public exploits (many have been public for awhile, some years even) and tested them against a selection of the leading anti-virus vendors: AVG, Norman, ESET, Panda, F-Secure, Sophos, Kaspersky, Symantec, McAfee, and Trend Micro.

The results are dismal and, according to NSS Labs, reveal that about 75 percent of organizations are not adequately protected.

How unprotected?

Well, the average protection score was 76 percent against the original exploit and 58 percent for a similar or alternative exploit. Note these exploits were not obfuscated in any way, according to NSS Labs. So many attacks in the real-world would even be more successful.

In baseball, a 76% average would be outstanding. When protecting your data: not so much.

But when one looks beneath the averages the results are even worse. Only one vendor, the highest ranked, stopped all exploits thrown at it. The lowest ranked vendor didn't even manage to stop 70 percent of the exploits thrown at it.

Symantec, according to the report, only managed to stop 71 percent of the exploits thrown at it.

These just aren't acceptable results. So not only are software vendors not investing enough to develop applications that will keep your data safe, but neither are most of the vendors that purport to protect you.

For my security and technology observations throughout the day, find me on Twitter.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-1503
Published: 2014-08-29
Cross-site scripting (XSS) vulnerability in Six Apart (formerly Six Apart KK) Movable Type (MT) Pro 5.13 allows remote attackers to inject arbitrary web script or HTML via the comment section.

CVE-2013-5467
Published: 2014-08-29
Monitoring Agent for UNIX Logs 6.2.0 through FP03, 6.2.1 through FP04, 6.2.2 through FP09, and 6.2.3 through FP04 and Monitoring Server (ms) and Shared Libraries (ax) 6.2.0 through FP03, 6.2.1 through FP04, 6.2.2 through FP08, 6.2.3 through FP01, and 6.3.0 through FP01 in IBM Tivoli Monitoring (ITM)...

CVE-2014-0600
Published: 2014-08-29
FileUploadServlet in the Administration service in Novell GroupWise 2014 before SP1 allows remote attackers to read or write to arbitrary files via the poLibMaintenanceFileSave parameter, aka ZDI-CAN-2287.

CVE-2014-0888
Published: 2014-08-29
IBM Worklight Foundation 5.x and 6.x before 6.2.0.0, as used in Worklight and Mobile Foundation, allows remote authenticated users to bypass the application-authenticity feature via unspecified vectors.

CVE-2014-0897
Published: 2014-08-29
The Configuration Patterns component in IBM Flex System Manager (FSM) 1.2.0.x, 1.2.1.x, 1.3.0.x, and 1.3.1.x uses a weak algorithm in an encryption step during Chassis Management Module (CMM) account creation, which makes it easier for remote authenticated users to defeat cryptographic protection me...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.