TUCoPS :: HP Unsorted K :: bt-30091.htm

KHOBE - 8.0 earthquake for Windows desktop security software
KHOBE - 8.0 earthquake for Windows desktop security software
KHOBE - 8.0 earthquake for Windows desktop security software


We have found number of vulnerabilities in implementations of kernel hooks in many different security products.

The argument-switch attack (or KHOBE attack) affects user mode and kernel mode hooks that are used to implement security features. The hook
may be vulnerable if it performs security checks on pointer or handle arguments that come from user mode. Using multiple threads the
attacker is able to change the meaning of the arguments in the middle of the hooked system call and thus bypass the security checks
implemented by the hook. The common implementations of kernel mode hooks, especially so called SSDT hooks, are vulnerable to argument-switch
attack. No product that we investigated during our research did not implemented the hooks correctly.

Vulnerable software:

    * 3D EQSecure Professional Edition 4.2
    * avast! Internet Security 5.0.462
    * AVG Internet Security 9.0.791
    * Avira Premium Security Suite
    * BitDefender Total Security 2010
    * Blink Professional 4.6.1
    * CA Internet Security Suite Plus 2010
    * Comodo Internet Security Free 4.0.138377.779
    * DefenseWall Personal Firewall 3.00
    * Dr.Web Security Space Pro
    * ESET Smart Security
    * F-Secure Internet Security 2010 10.00 build 246
    * G DATA TotalCare 2010
    * Kaspersky Internet Security 2010
    * KingSoft Personal Firewall 9 Plus 2009.05.07.70
    * Malware Defender 2.6.0
    * McAfee Total Protection 2010 10.0.580
    * Norman Security Suite PRO 8.0
    * Norton Internet Security 2010
    * Online Armor Premium
    * Online Solutions Security Suite 1.5.14905.0
    * Outpost Security Suite Pro
    * Outpost Security Suite Pro 7.0.3330.505.1221 BETA VERSION
    * Panda Internet Security 2010 15.01.00
    * PC Tools Firewall Plus
    * PrivateFirewall
    * Security Shield 2010
    * Sophos Endpoint Security and Control 9.0.5
    * Trend Micro Internet Security Pro 2010 17.50.1647.0000
    * Vba32 Personal
    * VIPRE Antivirus Premium 4.0.3272
    * VirusBuster Internet Security Suite 3.2
    * Webroot Internet Security Essentials
    * ZoneAlarm Extreme Security 9.1.507.000
    * probably other versions of above mentioned software
    * possibly many other software products that use kernel hooks to implement security features

More details are available here:

Advisory: http://www.matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php 
Article: http://www.matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php 

Kind Regards,

www.matousec.com Research 
Different Internet Experience Ltd.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH