The following text is copyright 2006 by Network World, permission is hearby given for reproduction, as long as attribution is given and this notice is included.

 

Antivirus: who is going to watch the watchers?

 

By Scott Bradner

 

If you are running a Windows computer and you are not running some sort of antivirus package then you are likely not the one running your computer.  It is very likely that some hacker half way around the world can do anything they want to with "your" computer.  In a Windows environment running an antivirus to protect the computer from worms and viruses is what is euphemistically called "a required option."  So what do you do when the very tool that is supposed to protect you from attack turns out to be enabling attacks?

 

That is just what happened with two Symantec security products.  On May 25th Symantec confirmed (http://www.symantec.com/avcenter/security/Content/2006.05.25.html) a report from eEye Digital Security that the Symantec Client Security and Symantec Antivirus Corporate Edition products have a vulnerability that could "allow a remote or local attacker to execute arbitrary code with System level rights." (http://www.eeye.com/html/research/upcoming/20060524.html)   as I write this Symantec has not yet announced a patch to block the vulnerability but I would expect such a patch before Microsoft gets around to patching a Word vulnerability that was announced about the same time.  (It's no non-neat that Microsoft almost always waits until it's regularly scheduled monthly patch date to issue a patch even if its customers are getting hurt by the vulnerability -- I do not expect that Symantec will show such a callous disregard for the safety of its customers.)

 

It makes a lot of sense for the bad guys to target a product like an antivirus package considering the almost ubiquitous deployment from such a few players.  A successful exploit will leave a lot of systems ripe for the picking.

 

This episode does bring up the age-old question in the security field "who will watch the watchers?"  In this case it was an independent security company, one that has gotten rather good at ferreting out these sorts of things, but we can not depend on having such a resource in all cases.

 

The same question pops to mind when reading the headlines of the past few weeks about the NSA and the secret equipment rooms in AT&T data centers. (http://www.wired.com/news/technology/0,70944-0.html)   Who is going to make sure that the NSA is actually doing only what it almost says it is doing.  I say "almost" because the information that the administration lets out is far from precise about the NSA effort in this case as well as the case of looking for calling patterns (or whatever they are doing) with all the phone records some of the phone companies so kindly gave them.

 

Security expert Bruce Schneier explores this area in a very insightful (as he normally is) May 18th column in Wired.  (http://wired.com/news/columns/0,70886-0.html?tw=wn_columns_7)

 

The big-brother style communications world being brought to us by governments in the name of protecting us from terrorists or protecting children from the evils of the Internet is a world that would be have seen by the old East German Stasi as close to the ideal. Tie this world to the Internet from, for and by the phone companies, as the FCC seems to want, and you wind up with a nightmare I'd rather wake up from.

 

disclaimer: "Harvard" and "nightmare" are related concepts in a few people's minds but the university did not express an opinion on watching watchers, I did.