Komodia superfish and Privdog vulnerability "ssl hijacker" [merged]

Well, what can I say :-\

On my work PC, Symantec is classing PrivDog 3.0.105.0 as “adware” and won’t even let me uninstall it - so I’ve now got a mish-mash installation with only part traces and files all over the place :embarassed:

Now you can’t even download PrivDog 3.0.105.0 - the ‘fixed’ version as all you get is a 404 error ! Is this a part admission that things are not right with the program ???

Come on guys, peoples trust is fading fast :frowning:

[attachment deleted by admin]

Uninstalled all of Comodo apps from my pc and other places.
Just placed order for Avira to replace it on 90% company’s i maintain and got a nice discount ! Others will move as comodo licenses are out.
As a former satisfied user im sorry to say goodbye to comodo.
My trust is hard to get but easy to maintain, and when i’m fooled i’m not coming back again

That is because of an intermittent bug in a 3rd party software that we found and fixed and updated within hours?

A bug/vulnerability is reality of software development. Its not a question of “if”, but “when” and the way to judge a company is how they deal with it when it happens. Privdog team issued a patch within hours and deployed it.

This is a false detection by Symantec, pls inform them.

Any comment on why PrivDog 3.0.150.0 is still not available to download ?

Guys are trying to add some extra features, some new innovation. They should be releasing shortly, not sure if they can get the full innovation ready for today…but they are trying.

O.K Thank You for the reply, very much appreciated.

Hopefully PrivDog can be proven to be implemented in the right way as apposed to “Superfish”, if not it would be nice to see the Browser extension implementation be brought back and developed as it appears it was not affected by the recent concerns.

ESET now detects PrivDog’s new fixed version installer as an adware :o
Screenshot : http://i.imgur.com/JmcX2CV.png
VT:
https://www.virustotal.com/en/file/c38e8f913a5e7ead122931a4a24ffc0e3cfb6e918a60bbf6e20551b0d86e4178/analysis/

The browser extension most likely won’t be updated in the future, or at least not the one for chrome, because chrome decided to block extensions outside of their web store without the possibility to re-enable the extension, this effectively blocked PrivDog extension on newer versions of Chrome.

false positive as it does not match their definition of adware as well as the original blogger did change his post removing reference to privdog as adware…

so go figure! :slight_smile:

oh btw…in my latest post i mentioned about https proxy and other companies who might be doing this…https://www.melih.com/2015/02/25/htpps-proxy-the-insight-what-you-didnt-know/

i came accross an ESET certificate…might be worth checking what this is about with them too CN=ESET_RootSslCert, O=”ESET, spol. s r. o.”, C=SK CN=ESET SSL Filter CA, O=”ESET, spol. s r. o.”, C=SK

I assume you all know the truth is finally coming out now:

Worse than Superfish? Comodo-affiliated PrivDog compromises web security too

Multiple companies integrated Komodia software, sometimes to darkly ironic effect. A legitimate certificate authority, Comodo Group, has ties to an advertising client (PrivDog) with an even worse security flaw — despite the fact that the Comodo Group is known for producing Internet security software. In essence, this means that a web security company has ties to a company with an even larger security-destroying flaw. The same man, Melih Abdulhayoglu, is the CEO of both Comodo Group and AdTrustMedia, PrivDog’s creator.

https://www.google.com/search?q=comodo+privdog

Time to do the Superfish, Komodia, PrivDog vulnerability test:

https://filippo.io/Badfish/

SSL-busting adware: US cyber-plod open fire on Comodo’s PrivDog

Essentially, Comodo’s firewall and antivirus package Internet Security 2014, installs a tool called PrivDog by default. Some versions of this tool intercept encrypted HTTPS traffic to force ads into webpages.

PrivDog, like the Lenovo-embarrassing Superfish, does this using a man-in-the-middle attack: it installs a custom root CA certificate on the Windows PC, and then intercepts connections to websites. Web browsers are fooled into thinking they are talking to legit websites, such as online banks and secure webmail, when in fact they are being tampered with by PrivDog so it can inject adverts.

If that’s not bad enough, PrivDog turns invalid HTTPS certificates on the web into valid ones: an attacker on your network can point your computer at an evil password-stealing website dressed up as your online bank, and you’d be none the wiser thanks to PrivDog.

Long time no see, bksening.
What are you trying to prove walking into Comodo’s own forums and start this riot?
I mean, if it does what you have stated, I fully agree that Privdog needs to be fixed or removed.

You are late.
It is already fixed.

Not to mention that the version shipped via our browsers IS NOT affected and was never affected. Gotta love “Copy & Paste journalism” (if you even want to even call it “journalism”).

bksening. I merged your topic with an already existing one. Please read it carefully. A lot of discussion has already taken place.

https://blog.hboeck.de/archives/865-Software-Privdog-worse-than-Superfish.html

Comodo’s PrivDog is how you do massively failing at security right. Nice job making your users vulnerable to MITM attacks. The worst kind of MITM attacks; the ones where users have a false sense of security thinking their SSL/TSL connection is safe using a trusted CA, when in fact it’s not.

Massive, massive, massive, massive fail Comodo. Not only will I never recommend any of your products to another person, ever, I will recommend anyone and everyone I speak to regarding computer security to avoid your products.

You fail.

So much noise about vulnerability that is fixed and worked on.

Microsoft dragged Windows vulnerability for 19 years and only recently fixed it and I didn’t hear so much yelling about it or losing trust in Microsoft. Every software has vulnerabilities it is just question of time to discover them, look at heartbleed bug and others like recently Linux bash shell vulnerability.

I want to recommend a new category of journalism

Internet journalist: copy,paste, add ■■■■, press publish!™

So let’s start identifying notable “internet journalists” :slight_smile: and give them the Internet journalists of the month titles :slight_smile: