Plug-in and Automatic update security Presented by Maxamed Hilowle
The topic Presentation • Insecurities within automatic update systems • Can patching let a cracker in?.
Abstract Model ConfidentialitySecure Compound IntegrityA cyclic redundancy check (CRC) / HashCertificatesDevelopment AvailabilitySeveral update sources
Process Model • In order to translate a CIA model to the Security update mechanism, the following process was established;
Confidentiality • Confidentiality is an import criteria for security. • And the users would consider to be a threat when confidentiality is compromised.
Attacks • In order to capture all data from all systems on a network, the attacker can use a technique called Address Resolution Protocol (ARP) spoofing.
Attacks • In that case an attacker might derive how update systems work. • Confidentiality is compromised when data is intercepted to obtain sensitive information
Integrity • Integrity refers to the validity of data. Validity might be impaired by transmission faults and alteration of the contents by attackers. • Reassurance to the receiver that the message has not been altered since it was transmitted by the sender.
This attacks know as Domain Name System DNS spoofing , and it can be a powerful attack method for hacking update mechanisms. • The attacker can redirect the update program to our own server and maybe even update the application with his own malicious code (Man-in-the-middle).
Availability • Updates frequently fix security issues in programs. • If a vulnerability is known, and the available patch not applied, the system is vulnerable • for attackers. Therefore, updates should be easy to acquire.
Automatic update Sun provides an automatic update system to keep the virtual machine updated with the latest patches, This system called jusched.exe is automatically installed under Windows operating systems. If the update system finds a new update, it notifies the user and automatically install updates.
Windows users they ignore these warnings, and most users run as administrator under Windows, it might silently install a virus while installing a modified version of JRE.
Conclusion • The developers can make the update mechanism itself more secure. • The users can be more cautious when using such a system.
You can find more details and how DNS, ARP spoofing and other well known attacks work • http://technorati.com/videos/youtube.com%2Fwatch%3Fv%3D9z8i9SQr_s8 • http://technorati.com/videos/tag/arp+spoofing • http://technorati.com/videos/youtube.com%2Fwatch%3Fv%3DHppWr3mKwW4 • http://technorati.com/videos/tag/dns+spoofing • http://www.parosproxy.org • http://www.slavasoft.com/hashcalc/index.htm • http://ettercap.sourceforge.net/ • http://www.wireshark.org/