Dailydave mailing list archives

RE: File-format based vulns - How do IDS/IPS vendors detectthem?


From: "Paul Melson" <pmelson () gmail com>
Date: Thu, 10 Nov 2005 10:38:00 -0500

-----Original Message-----
Subject: [Dailydave] File-format based vulns - How do IDS/IPS vendors
detectthem?

After the recent announcement of file-format based vulnerabilities in MS
Patch Tuesday, I 
was wondering how do IPS/IDS vendors claim to protect against them (most
of them like 
TippingPoint claim to do so).
Do they scan data transfer streams (SMTP, FTP, HTTP etc) for these
malicious files or is it > a local check? If they do detect it on the
network doesn't it screw up their device due to 
high chance of false positives and high resource consumption.

Your network IDS can look into data streams for these exploits, but
typically one of two things happens.  Either the check is looking for
something (or multiple things) that come from known exploit code or it looks
for something unique to the vulnerability.  These methods both have
problems.  

The first method may miss exploits that the vendor didn't examine when
writing their signature, leaving you vulnerable and unaware.  It's bad, but
still fairly common practice.  Typically products that do this have R&D
teams that have been instructed to "teach to the test" as this form of
detection does well in trade magazine shoot-outs.  However, I think it's
obvious why these signatures don't do so well in the wild.

The second method casts a large net, and is likely to alert and/or shut down
connections that aren't actually part of an attack.  A good example of this
are the Bleeding Snort signatures for MS05-036, the previous Microsoft image
file format vulnerability.  What those signatures actually test for is the
number and size of embedded ICC tags inside of Jpeg or Gif image files.
These signatures generate plenty of false positives as lots sites use these
tags outside of the ICC standard.

In either case, your network IDS is only looking for tiny pieces of data to
alert on, which will not consume a large number of resources.  But you bring
up a good point.  The reason that detection methods like these are used is
because they're low-cost.  Better analysis is possible, but at resource
costs that don't scale.  At least not yet.


PaulM


Current thread: