[Infowarrior] - McAfee Gets Worked. Hard.

Richard Forno rforno at infowarrior.org
Tue May 5 12:37:44 UTC 2009


McAfee Gets Worked. Hard.
Patrick Gray's picture
Embarrassing vulnerabilities in McAfee websites poised to make  
headlines...
By Patrick Gray

http://risky.biz/news_and_opinion/patrick-gray/2009-05-05/mcafee-gets-worked-hard

May 5, 2009 --

Security software maker McAfee is an industry laughing stock following  
the disclosure of embarrassing security vulnerabilities in its websites.

A Cross Site Request Forgery (CSRF) vulnerability uncovered in  
McAfee's "secure" vulnerability scanning portal would have allowed  
attacker to take control of client accounts. The portal is designed to  
scan customer websites for security vulnerabilities and fulfil some  
PCI DSS compliance requirements.

To fall victim to the attack the target would have to be logged in to  
their McAfee account and browse to a malicious website that exploited  
the CSRF bug.

Commenting on his CSRF discovery, security researcher Mike Bailey  
didn't pull punches. "Until last week, McAfee Secure was vulnerable to  
critical CSRF holes," he wrote on his blog. "Not little ones, or ones  
that were difficult to exploit. [These are] basic, zero-knowledge,  
classic GET-based total-account-compromise holes."

McAfee did not comply with PCI requirements for Approved Scanning  
Vendors as defined by the PCI Security Standards Council, Bailey  
claims, and believes the company failed to use a secure software  
development lifecycle when building the application.

Furthermore, a penetration test should have caught the problem, he  
wrote, thus he concludes "no such audit has taken place".

Another, seemingly unrelated Cross Site Scripting (CSS) bug in a  
McAfee website allows miscreants to create pages that appear to be  
hosted on McAfee domains, when in fact the content is being served  
from elsewhere. Worse, no SSL errors would be generated in this  
attack, so even a vigilant user would be fooled.

SecureScience.net has demonstrated the attack by creating a "buy now"  
page for McAfee products, which, if a user clicked through to that  
page, would steal their credit card number and deliver a trojaned  
version of McAfee's product. (Click here for the dummied up CSS'd  
page. It won't bite.)

It's feared spammers could exploit the bug to offer seemingly  
legitimate "special deal offers" on McAfee products, using the CSS bug  
to create a genuine-looking purchase page with a valid SSL cert.  
McAfee, presumably, is scrambling to fix this second issue.

Ironically, marketing material for McAfee's secure scanning portal  
claims the service detects CSS vulnerabilities.

Sydney-based security consultant Chris Gatford, who works for Pure  
Hacking, believes the disclosures highlight an all too common  
hypocrisy among security providers. "It's a sad fact that many  
security service providers do not practice what they preach," he says.

Others thought the revelations were nothing short of hilarious. One  
local PCI Qualified Security Assessor (QSA), who did not want to be  
named, described the news as hysterical. "If there was a vote for lolz  
of the year I would be voting for McAfee Secure," he says. "That's  
just stunning."

McAfee isn't the only security vendor to wear egg on its face this  
year. The website of antivirus software maker Kaspersky was defaced in  
February. The website of BitDefender, another AV vendor, was also  
defaced.

Risky.biz sought comment from McAfee, but due to time-zone differences  
it was unable to offer any response in time for deadline.



More information about the Infowarrior mailing list