Third-party apps failing to use Windows security features

Share this article:
Many third-party Windows applications are failing to utilize two important security features that could prevent certain code execution attacks, according to a report released Thursday by Secunia.

Researchers at the Danish vulnerability tracking firm recently investigated whether some of the most popular third-party applications used two built-in Windows security features, known as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR).

DEP, first introduced in the Windows XP Service Pack 2 in August 2004, makes part of the memory nonexecutable and, as a result, renders the exploit development process more complex and time consuming.

ASLR, introduced with the release of Windows Vista in early 2007, randomizes memory space and significantly lowers the chances for certain code execution attacks to succeed.

These two defensive measures, used by most Microsoft applications, are overlooked by many third-party application developers even though they are simple to implement, the report states.

The defenses do not negate the need for patching or prevent all code execution attacks, but can in some cases prevent the exploitation of vulnerabilities, and in other cases, make successful exploitation much less likely, Thomas Kristensen, CSO of Secunia, told SCMagazineUS.com Thursday.

“These protective mechanisms are something that Microsoft has been promoting a lot regarding Windows 7 and Vista,” Kristensen said. “It's definitely something that software developers should be aware of, so why they haven't deployed them is difficult to answer.”

Some of the most popular third-party Windows programs, including Sun Java JRE, Apple Quicktime, VLC Media Player, OpenOffice.org, Google Picasa, Foxit Reader, Winamp and RealPlayer, do not currently use DEP or ASLR, the researchers found.

“The ones that should be the most motivated to use this are the big vendors who frequently get vulnerability reports,” Kristensen said. “So we fear implementation would be even worse for the vendors we didn't look at.”

On the positive side, some applications have, over time, become compatible with DEP, including Mozilla Firefox and Apple's iTunes and Safari. However, the overall implementation process has been slow and inconsistent between operating system versions, the report states. Even worse, ASLR support has been improperly implemented by “almost all vendors,” the report states.

The two security defenses must be used in concert for the best impact, Kristensen said.

“By combining DEP and ASLR, you raise the bar and make it significantly more difficult to exploit many of these vulnerabilities,” he said.

Of the 16 applications analyzed, Google Chrome was the only to utilize both DEP and ASLR, Kristensen said. A Google spokesman told SCMagazineUS.com on Thursday that the company also plans to enable these features in an upcoming release of Picasa.

“Going forward, I would hope that more vendors use these defensive mechanisms,” Kristensen said. “It would make it significantly harder to exploit common vulnerabilities in these products and that would help secure the end users.”

Share this article:

Sign up to our newsletters

More in News

Research shows vulnerabilities go unfixed longer in ASP

Research shows vulnerabilities go unfixed longer in ASP

A new report finds little difference in the number of vulnerabilities among programming languages, but remediation times vary widely.

Bill would restrict Calif. retailers from storing certain payment data

The bill would ban businesses from storing sensitive payment data, for any long than required, even if it is encrypted.

Amplification, reflection DDoS attacks increase 35 percent in Q1 2014

Amplification, reflection DDoS attacks increase 35 percent in ...

The Q1 2014 Global DDoS Attack Report reveals that amplification and reflection distributed denial-of-service attacks are on the rise.