Risk
6/12/2009
05:43 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

China 'Green Dam' Censorware Called Security Risk

Chinese authorities claim the software is necessary to protect people from pornography, but the software has been found to block politically sensitive terms.

China's plan to require Web filtering software on all PCs sold in the country after July 1 continues to draw fire from individuals and organizations inside and outside the country.

Three computer scientists with the University of Michigan on Thursday published an analysis of the "Green Dam Youth Escort" software required by the Chinese government and found that "it contains serious security vulnerabilities due to programming errors."

The researchers state that the software contains systemic flaws in its code as a result of unsafe programming techniques and that the software's problems are compounded by a design that exposes it to a large variety of potential attacks.

"If Green Dam is deployed in its current form, it will significantly weaken China's computer security," the report states. "While the flaws we discovered can be quickly patched, correcting all the problems in the Green Dam software will likely require extensive rewriting and thorough testing. This will be difficult to achieve before China's July 1 deadline for deploying Green Dam nationwide."

Chinese authorities claim the software is necessary to protect people from harmful information, specifically pornography. But the software has been found to block politically sensitive terms.

According to a report in The Wall Street Journal, two professors in China have filed formal complaints against the government's plan to the China State Council and the National Anti-Monopoly Committee stating that the Green Dam mandate is an "abuse of power."

Li Fangping, a human rights lawyer in Beijing, is also challenging the legality of the government's plan. He has asked China's Ministry of Industry and Information Technology to hold a hearing on the issue.

On Thursday, the Global Network Initiative, a coalition of information and communications companies, human rights organizations, academics, and others, said the software raised human rights concerns. It also questioned the legitimacy of the Chinese government's approach.

"An approach for protecting children online that requires the mandatory installation of a particular software package that is difficult to uninstall and filters far more than sexually explicit content is not consistent with the practices of other countries that have encouraged parental control tools and is far out of proportion to the goal of child protection," the GNI said in a statement.

The Chinese government appears not to like what it's hearing. Rebecca MacKinnon, assistant professor at the Journalism & Media Studies Center at the University of Hong Kong, notes in a blog post that Chinese Internet users have been posting copies of notices, sent from the government's Central Propaganda department to news organizations, that direct recipients "to tone down the criticism and take on a more positive tone toward Green Dam."


InformationWeek Analytics has published an independent analysis on what executives really think about security. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.