Risk
6/12/2009
05:43 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

China 'Green Dam' Censorware Called Security Risk

Chinese authorities claim the software is necessary to protect people from pornography, but the software has been found to block politically sensitive terms.

China's plan to require Web filtering software on all PCs sold in the country after July 1 continues to draw fire from individuals and organizations inside and outside the country.

Three computer scientists with the University of Michigan on Thursday published an analysis of the "Green Dam Youth Escort" software required by the Chinese government and found that "it contains serious security vulnerabilities due to programming errors."

The researchers state that the software contains systemic flaws in its code as a result of unsafe programming techniques and that the software's problems are compounded by a design that exposes it to a large variety of potential attacks.

"If Green Dam is deployed in its current form, it will significantly weaken China's computer security," the report states. "While the flaws we discovered can be quickly patched, correcting all the problems in the Green Dam software will likely require extensive rewriting and thorough testing. This will be difficult to achieve before China's July 1 deadline for deploying Green Dam nationwide."

Chinese authorities claim the software is necessary to protect people from harmful information, specifically pornography. But the software has been found to block politically sensitive terms.

According to a report in The Wall Street Journal, two professors in China have filed formal complaints against the government's plan to the China State Council and the National Anti-Monopoly Committee stating that the Green Dam mandate is an "abuse of power."

Li Fangping, a human rights lawyer in Beijing, is also challenging the legality of the government's plan. He has asked China's Ministry of Industry and Information Technology to hold a hearing on the issue.

On Thursday, the Global Network Initiative, a coalition of information and communications companies, human rights organizations, academics, and others, said the software raised human rights concerns. It also questioned the legitimacy of the Chinese government's approach.

"An approach for protecting children online that requires the mandatory installation of a particular software package that is difficult to uninstall and filters far more than sexually explicit content is not consistent with the practices of other countries that have encouraged parental control tools and is far out of proportion to the goal of child protection," the GNI said in a statement.

The Chinese government appears not to like what it's hearing. Rebecca MacKinnon, assistant professor at the Journalism & Media Studies Center at the University of Hong Kong, notes in a blog post that Chinese Internet users have been posting copies of notices, sent from the government's Central Propaganda department to news organizations, that direct recipients "to tone down the criticism and take on a more positive tone toward Green Dam."


InformationWeek Analytics has published an independent analysis on what executives really think about security. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8142
Published: 2014-12-20
Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys w...

CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.