The headline seems a bit melodramatic, "Antivirus tools pave the way for malware." A company called n.runs AG is claiming to have found hundreds of security holes in multiple anti-virus programs, which can be exploited by the very malware those products are supposed to protect you against. The company's press release implies that many of the holes have to do with the way various anti-virus programs parse inspect The headline seems a bit melodramatic, “Antivirus tools pave the way for malware.” A company called n.runs AG is claiming to have found hundreds of security holes in multiple anti-virus programs, which can be exploited by the very malware those products are supposed to protect you against. The company’s press release implies that many of the holes have to do with the way various anti-virus programs parse inspected data files. Not surprisingly, n.runs AG has a solution it can sell worried companies.I’m not sure whether I agree with the obviously self-interested paper’s conclusion that buying another third-party product is the solution, but the overall theme (that anti-malware software is often an avenue for exploitation) is true. And exploitation using parsing avenues has often been the way those vendor products were exploited. Many of the top anti-malware vendors have ended up finding parsing issues in their product over the past few years (not all, but many), and some have repaired the original parsing issues only to see them raised again with exploits found after the original vulnerability. I’ve even had to change the way that I use the excellent Wireshark protocol analyzer on my honeynets. I use Wireshark to capture network traffic data streams, but over the years, dozens of parsing errors have been found in Wireshark that would allow malicious exploitation of my network. To prevent hackers from taking over my honeynet monitoring workstation, I changed my data capturing techniques to capture the data live, but do the parsing, formatting, flow analysis, and identification offline.Even pulling out the parsing issues, some anti-malware tools seem to be plagued with buffer overflow holes — not one or two, but one or two a year, year after year. And I bet many of the anti-malware tools that have not been found to contain buffer overflow holes are vulnerable, but people are looking or advertising the vulnerabilities they find, not those that simply might exist. Strange as this may sound, anti-malware vendors are no better at secure coding than any other software vendor. You would think that all computer security vendors would give their software programmers special training in Secure Development Lifecycle (SDL) techniques and offer incentives for secure coding, but you would be wrong. Some do, but most don’t. When I was at a penetration testing firm, we did code reviews for two of the big anti-virus companies, and found dozens of high-risk code errors that would lead to buffer overflows and the like. Like most programmers, security software programmers are hired for their programming knowledge and with the (false) expectation that they will naturally code securely — just like most other companies not practicing SDL wrongly assume.You might even assume that public, critical security issues in a software defense program would be tackled and solved with all possible haste and resources by all anti-malware companies. You would be wrong. I was teaching a CISSP course to one of the world’s largest anti-malware companies a few years back, and their central product was found to have a nasty, remotely exploitable buffer overflow that was being actively exploited. The programmer who owned that portion of code was in my class, and I was there when they came to get him to fix it. He refused to leave the class, as they had been promising that he could attend a class — any class — during the previous five years and all his previous classes had been canceled. So he refused to leave. He worked, part-time, on the problem in class using a VM session on the class image, debugging and fixing the problem. This was while the exploit was being actively exploited by automated malware for nearly a week. He took five days to code the fix, then finally pushed it out a few days later. I had always imagined, before this experience, that in a similar situation, a huge, popular company would respond with a large “SWAT team” and tackle the bug as if the company’s lifeblood depended on it. In reality, it was one guy, part-time. I also realized that as bad as this story is, I’ll bet that it’s the same in a bunch of large companies: one guy, who either gets it done or it doesn’t get done, with priorities that may not be the same as the customer’s.As a professional pen tester, I often broke in to clients using code exploits for vulnerabilities in their anti-malware defenses. When I was walking around the client’s site, I would take note of their firewall models, intrusion detection boxes, anti-virus software, and anti-spam appliances. Or externally, I would send messages and packets intentionally designed to produce errors. Using those errors, I would then try to identify the perimeter defenses. In truth, breaking in using the client’s anti-malware defenses was a lot easier than even writing this column. After a few years of pen testing, it became the first thing I would try. For example, I never found a Cisco PIX firewall fully patched, even in places that dealt with classified information. Administrators often allowed remote access to security appliances off the Internet, and I used hard-coded admin passwords or well-known weak scripts to break in.What can you do to protect yourself?Make sure all your anti-malware devices are fully patchedMake sure unnecessary services and administrative access points are turned off, or have complex passwords/protections.Don’t reuse passwords between your anti-malware defenses and your internal networkWhen you go to buy anti-malware software or appliances, do a little research to find out how many exploits have been found in your vendor’s products over the yearsRun a vulnerability scanner against the vendor’s product before you buy. You wouldn’t believe how many vulnerabilities an open source vulnerability scanner can find against appliances. Web interfaces are especially ripe with exploits.If the appliance runs Linux, BSD, or Unix, what kernel version does it run, and how easy is it to update? Most appliances never update their kernel versions.If you’re a large buyer, ask the vendor if they practice SDL coding and to share with you the processes they use.I’m not really sure if you need to by a third-party product to protect your organization against exploits in anti-malware software, but it’s good to at least give the problem a little thought. Related content analysis The 5 types of cyber attack you're most likely to face Don't be distracted by the exploit of the week. Invest your time and money defending against the threats you're apt to confront By Roger Grimes Aug 21, 2017 7 mins Phishing Malware Social Engineering analysis 'Jump boxes' and SAWs improve security, if you set them up right Organizations consistently and reliably using one or both of these approaches have far less risk than those that do not. By Roger Grimes Jul 26, 2017 13 mins Authentication Access Control Data and Information Security analysis Attention, 'red team' hackers: Stay on target You hire elite hackers to break your defenses and expose vulnerabilities -- not to be distracted by the pursuit of obscure flaws By Roger Grimes Dec 08, 2015 4 mins Hacking Data and Information Security Network Security analysis 4 do's and don'ts for safer holiday computing It's the season for scams, hacks, and malware attacks. But contrary to what you've heard, you can avoid being a victim pretty easily By Roger Grimes Dec 01, 2015 4 mins Phishing Malware Patch Management Software Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe