Exploit Protection On Windows XP - AV-TEST

2y ago
9 Views
2 Downloads
525.16 KB
8 Pages
Last View : 15d ago
Last Download : 3m ago
Upload by : Aarya Seiber
Transcription

A test commissioned byQihoo 360and performed byAV-TESTGmbHDate of the report:April 30th, 2014Exploit Protection on Windows XPAV-TEST 20141

ContentExecutive Summary.3Detailed Test Report.4Test Environment and Products. 4Test Samples. 4Test Methodology.5Test Results. 6Conclusion.8Exploit Protection on Windows XPAV-TEST 20142

Executive SummaryAV-TEST examined 10 anti-virus software solutions in regards to their protection capabilitiesagainst exploits targeting vulnerabilities on Windows XP.Since the support for Windows XP ended in April 2014 and Microsoft will not provide anyfurther updates to the OS, not even for critical security vulnerabilities, it is expected that a lotof attacks to Windows XP will follow. There are different estimations on how many PCs arestill running XP but they agree that it is roughly 25% of all Windows PCs worldwide.All of these PCs are now an easy target as soon as a new vulnerability is detected and canbe exploited by malware to infect the system. There are only two solutions:1. Upgrade to another operating system2. Protect your system with anti-virus softwareOption 1 is often not possible due to hardware constraints and similar problems. So for mostusers the only option is to rely on a good working anti-virus software.Since the main problem for Windows XP will be new, currently unknown, exploits it isimportant that the security solutions provide generic features to block those kinds of attacks.In order to test the exploit blocking capabilities, AV-TEST used a Windows XP installationthat was vulnerable to a number of exploits and checked whether the products were able todetect and block these attacks.Qihoo 360 and Norton were the only products to successfully block all 54 attacks. Theseproducts will likely provide a good protection even for yet unknown attacks. Bitdefender,Kaspersky and Kingsoft also showed a good result, only missing out on certain vulnerabilitiesor certain circumstances. The average blocking rate was only 74%, which shows that usershave to be careful when making their choice for an anti-virus software to protect theirWindows XP environment.Exploit Protection on Windows XPAV-TEST 20143

Detailed Test ReportTest Environment and ProductsThe test has been carried out on Windows XP, SP3-bit)(32English(v5.1.2600 SP 3 Build 2600) andInternet Explorer8.0.6001.18702IC. Furthermore Microsoft Office Excel 2003 (11.5612.5606) andWord 2003 (11.5604.5606) were installed to process documents exploiting vulnerabilities in thissoftware.The products and the versions are listed in the table below. All products have been installed andtested in default settings. No options have been modified.Product NameAvast Internet Security 2014AVG Internet Security 2014Avira Internet Security Suite 2014Bitdefender Internet Security 2014Eset Smart Security 7Kaspersky InternetSecurity 2014Kingsoft Antivirus 2013Norton Internet Security 2014Qihoo 360Internet Security 9 BetaTencent PC ManagerProduct 389.7.0.1001 Beta8.5.24996.501Table1: Tested ProductsThe testedproducts were installed on plain Windows machines with the following configuration:HetisG31 Office-PCIntel Xeon Quad Core X3360 2,83GHz 12MB FSB13334 GB DDR2 667-RAM Kingston (2x 2048 MB)500 GB SATA II WD Raid Edition III 3,5"A disk image for eachof the products has been created and was used throughout the test. Theproducts had been updated on every day of the test to make sure latest products versions have beenthused. A final retest of all previously missed cases has been performed on Apriland2829th withupdated products.Test SamplesIn order to create exploits used for thetest MetaSploit in v4.8.2 (Update 1)has been used. Theseexploits have then been applied with MetaSploit as well.In total 54 samples were created, targeting 7 differentvulnerabilities, combined with differentobfuscation and evasion options as well as different payloads to simulate a wide variety of possiblemalware attacks.The different options are shown in the tables below.exploit/windows/browser/ie execcommand uaf(ms12 063)exploit/windows/browser/ms10 022 ie vbscript winhlp32exploit/windows/browser/ms10 042 helpctr xss cmd execexploit/windows/browser/ms10 046 shortcut icon dllloaderexploit/windows/browser/ms12 037 ie colspanexploit/windows/fileformat/ms09 067 excel featheaderExploit Protection on Windows XPAV-TEST 20144

exploit/windows/fileformat/ms12 027 mscomctl bofTable2: Targeted Vulnerabilitiesgeneric/shell reverse tcpwindows/download verse tcpwindows/vncinject/reverse tcpTable3: Used PayloadsManual yMarihnhaverbekeTable4: Applied Evasion and ObfuscationThe complete list of the differentcombinations is given inthe appendix.The exploits that are used in the testing only attack vulnerabilities in Microsoft software. No exploitshave been used that attack third party software such as Adobe Reader or Java, as these applicationsare still supported by their vendors and will receive security updates.Test MethodologyThe creation of exploit samples with MetaSploit usually gives two different types of objects:1. Actual files, such as documents that can be accessed directly, e.g. on thesystemfile2. HTTP content that is served from MetaSploit and reacts to client requestsIn order to cover this a Windows PC running MetaSploit had been set up. The clients were able toaccess the web server provided by this PC in order to access the exploitswouldthatthen try toattack the vulnerable software components.The individual steps to run the test were as follows:1. The exploit has been set up on MetaSploit2. The client has been reimaged with an-to-dateupdisk image of the product under test3. The client then tried to access the web site containing the exploit, served by the MetaSploitsystem resp. tried to access the document containing an exploit that was created earlier4. If there were any notifications from the anti-virus software they have been noted anddocumented (e.g. by creating screenshots or storing report files)5. Furthermore it was checked whether the exploit was able to execute the payload6. If there was a detection by the product and no payload was executed then this was countedas successful block7. If there was no detection and the payload was executed then this was counted as(evenmisswhen some components would have been detected a few minutes later)8. In case there was no detection and no execution of the payload either, this indicated an errorand the test has been repeated or the test case had to be removed from the resultsExploit Protection on Windows XPAV-TEST 20145

Test ResultsQihoo 360and Norton achieved the best results in detecting/blocking the 54 attacks.Closelyfollowing are Kaspersky and Kingsoft which only failed on a few samples.The overall test results aregiven in the following table.Product NameAvast Internet Security 2014AVG Internet Security 2014Avira Internet Security Suite 2014BitdefenderInternet Security 2014Eset Smart Security 7Kaspersky Internet Security 2014Kingsoft Antivirus 2013Norton Internet Security 2014Qihoo 360Internet Security 9 BetaTencent PC ManagerBlocked Attacks (out of 54)33373742315148545410In %18,52%Table5: Overall Test ResultsThe average blocking rate was4%,7 so 5 products were better than the average and 5 were worse.The worst result was 10 from 54 samples, meaning that only around 18% of the attacks wereblocked.When looking at the data a bit differently, an interesting observation can be made. The followingtable shows the results of 33 exploits were no obfuscation or evasion has been applied.Product NameAvast Internet Security 2014AVG Internet Security 2014Avira Internet Security Suite 2014Bitdefender Internet Security 2014Eset Smart Security 7Kaspersky Internet Security 2014Kingsoft Antivirus 2013Norton Internet Security 2014Qihoo 360Internet Security 9 BetaTencent PC ManagerBlocked Attacks (out of 33)2724272724322733338In %24,24%Table6: Test Results of Samples without ObfuscationFor all productsbesides Kingsoftthe blocking rates for these samples are much better than theresults for all samples. The average blocking ofrateall productsis also higher than before, with78,79%.Theresults indicatethat several products may have static detection for certain oitsexplor certainMetaSploit components (such as the payloads)only and are vulnerable to even basic obfuscation andevasion techniques. This assumption can be verified when looking at the results of the 21 samplesthat used obfuscation or evasion techniques.Product NameAvast Internet Security 2014AVG Internet Security 2014Exploit Protection on Windows XPBlocked Attacks (out of 21)613In %28,75%61,90%AV-TEST 20146

Avira Internet Security Suite 2014Bitdefender Internet Security 2014Eset Smart Security 7Kaspersky Internet Security 2014Kingsoft Antivirus 2013Norton Internet Security 2014Qihoo 360Internet Security 9 BetaTencent PC 00%100%9,52%Table7: Test Results of Samples withObfuscationBy looking at these numbers it is possible to determine products that have generic techniques todetect and protect from exploits. Products that detect less samples than before are likely to havestatic signatures or weak heuristics that caneasilybe fooled by real attackers.Kingsoft, Norton andQihoo 360are not fooled by evasion or obfuscation in this test. Also Kaspersky only misses out ontwo samples here. Interestingly, the missed cases of Kaspersky all use the messagebox payload,which of course wouldn’t be used in a real attack.reverse shell or execution of a binary) are detected reliably by the product.AllThe following tables show which products were able to handlewhich exploit.ven when all ‘All’ issamples have been detected, ‘Some’ is given whengiven when no sample was er AllESETSomeKaspersky SomeKingsoftAllNortonAllQihoo 360 omeTable8: Vulnerability Coverage per ProductAs can be seen, most products have a solid detection of most exploits. NortonQihooand 360coverall vulnerabilities completely.Bitdefender doesn’t cover one vulnerKingsoft have misses in case of two vulnerabilities.AVG, ESET and Tencent have misses in at leastthree cases.One note hasto be made regardingthe products that perform well: Not every detection is generic.They also provide static detection (signatures) to detect certain exploits or even MetaSploit modules.So a good result in this test is not a guarantee that they will generically detectttacksall a in real life.But the probability that they will detect more new attacks is high.Exploit Protection on Windows XPAV-TEST 20147

ConclusionthWith the end of support for Windows XP as of April20148this still widely deployed system is atrisk, more than ever before. The problem is not commodity malware but the problem will be exploitsfor yet undetected vulnerabilities that will not be patched by Microsoft anymore.Therefore it will beone of the main tasks for anti-virus software to deliver reliably exploit detection when trying toprotect Windows XP:There are basically two possibilities to detect attacks by exploits:1. Statically by signatures, that will detect certain versions of a specificexploit2. Generically, to detect the techniques used by exploits instead of detecting the exploit itselfProducts that have a good coverage in exploit protection will use both techniques, as neither isenough to prevent all attacks. Older and known exploitscan be covered with static signatures, butvendors have to be careful to also cover obfuscated variants. New, unknown or heavily obfuscatedexploits will be detected with generic approaches that look for typical behavior of exploits.As the results of the above testing have shown,Qihoo 360, Kaspersky and Norton provide a verygood protection rate against exploits that target Windows components. All of these products use acombined approach in detecting attacks, as described above.Copyright 2014 by AV-TESTGmbH, Klewitzstr. 7, 39112 Magdeburg, GermanyPhone 49 (0) 391 60754-60, Fax 49 (0) 391 60754-69, Web http://www.AV-TEST.orgExploit Protection on Windows XPAV-TEST 20148

Exploit Protection on Windows XP AV-TEST 2014 1 Exploit Protection on Windows XP . Kingsoft Antivirus 2013 2013.SP7.5.042815 Norton Internet Security 2014 21.2.0.38 Qihoo 360 Internet Security 9 Beta 9.7.0.1001 Beta Tencent PC Manager 8.5.24996.501 Table 1: Tested Products

Related Documents:

The Windows The Windows Universe Universe Windows 3.1 Windows for Workgroups Windows 95 Windows 98 Windows 2000 1990 Today Business Consumer Windows Me Windows NT 3.51 Windows NT 4 Windows XP Pro/Home. 8 Windows XP Flavors Windows XP Professional Windows XP Home Windows 2003 Server

AutoCAD 2000 HDI 1.x.x Windows 95, 98, Me Windows NT4 Windows 2000 AutoCAD 2000i HDI 2.x.x Windows 95, 98, Me Windows NT4 Windows 2000 AutoCAD 2002 HDI 3.x.x Windows 98, Me Windows NT4 Windows 2000 Windows XP (with Autodesk update) AutoCAD 2004 HDI 4.x.x Windows NT4 Windows 2000 Windows XP AutoCAD 2005 HDI 5.x.x Windows 2000 Windows XP

A computer with at least a 450MHz Pentium CPU with 128 MB of RAM, running Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows 8/8.1, Windows 10, Windows Server 2012, Windows Server 2016 or Windows Server 2019 platforms. Instal

Windows Defender AV will indicate a detection through standard Windows notifications. You can also review detections in the Windows Defender AV app. The Windows event log also records detection and engine events. See the Windows Defender Antivirus events topic for a list of event IDs and their corresponding actions. Cloud protection features

Windows 8.1 *6 Windows Server 2003 *7 Windows Server 2008 *8 Windows Server 2012 *9 Mac OS X *10: Supported *1 Printer drivers support both 32-bit and 64-bit Windows. *2 Microsoft Windows XP Professional Edition/Microsoft Windows XP Home Edition *3 Microsoft Windows Vista Ultimate/Microsoft Windows Vista Enterprise/Microsoft Windows Vista Business/

BY WINDOWS Yin Liang & Zhou Li Tencent PC Manager. Outline About us How to exploit old Windows OS Windows 10 s limit New exploit method. About us xin, godz, ki, michael, kelvin, willj Attacking Adobe Flash in Pwn2Own 2016 Achieve: Team member: Attacking Surface Pro 4 in GeekPwn Macao

Microsoft Windows 7, 32-bit and 64-bit Microsoft Windows 8 & 8.1, 32-bit and 64-bit Microsoft Windows 10, 32-bit and 64-bit Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012, 64-bit only RAM: Minimum 2 GB for the 32-bit versions of Microsoft Windows 7, Windows 8, Windows 8.1, and Windows 10.

The XilMailbox library provides the top-level hooks for sending or receiving an inter-processor interrupt (IPI) message using the Zynq UltraScale MPSoC and Versal ACAP IPI hardware. Chapter 1: Xilinx OS and Libraries Overview