fencepost
Well-Known Member
- Reaction score
- 2,314
- Location
- Schaumburg, IL
The sheer level of incompetence described in the security report that this Hacker News thread is about is astonishing. (The original security report is here: https://code.google.com/p/google-security-research/issues/detail?id=693).
Basically, Trend Micro (apparently the consumer edition(s) not so much the business/enterprise ones) has a few minor security flaws. The first one to turn up was that they install a local webserver which can be used to launch any program - all a webpage has to do is send a request to it using 'localhost'. Of note: the sample exploit code that Tavis provided in post #13 on the bug report launches an excutable to.... Uninstall Trend Micro.
After that little issue turned up and more investigation ensued, it turns out they include a "Secure Browser" mode - it even says "Secure Browser" in the User-Agent of what they launch - which turns out to be a year-old version of Chromium (so minus a bunch of security fixes) that is explicitly launched with the command-line option "--disable-sandbox" thrown in just to remove an additional layer of security.
And the real winner: When you install, it offers to import all your browser-stored passwords into their Secure Password Storage (don't worry - if you decline to do that, any webpage you visit can force it later by calling one of those 'localhost' APIs). Once your passwords are in the Secure Password Storage, any website can generate a call to a 'localhost' API to extract the encrypted passwords, then use another to decrypt them, then POST them out to another website.
I'm horrified. And glad that I don't know anyone running consumer Trend Micro.
Basically, Trend Micro (apparently the consumer edition(s) not so much the business/enterprise ones) has a few minor security flaws. The first one to turn up was that they install a local webserver which can be used to launch any program - all a webpage has to do is send a request to it using 'localhost'. Of note: the sample exploit code that Tavis provided in post #13 on the bug report launches an excutable to.... Uninstall Trend Micro.
After that little issue turned up and more investigation ensued, it turns out they include a "Secure Browser" mode - it even says "Secure Browser" in the User-Agent of what they launch - which turns out to be a year-old version of Chromium (so minus a bunch of security fixes) that is explicitly launched with the command-line option "--disable-sandbox" thrown in just to remove an additional layer of security.
And the real winner: When you install, it offers to import all your browser-stored passwords into their Secure Password Storage (don't worry - if you decline to do that, any webpage you visit can force it later by calling one of those 'localhost' APIs). Once your passwords are in the Secure Password Storage, any website can generate a call to a 'localhost' API to extract the encrypted passwords, then use another to decrypt them, then POST them out to another website.
I'm horrified. And glad that I don't know anyone running consumer Trend Micro.