Why not implement a mechanism to prevent buffer overflows from happening?
(Or at least dramatically reduce the occurance of most BO related issues and raise the bar for the cracker).
The infamous open-source project known as PaX does this for Linux. There is a slight performance hit, but nothing a desktop user will notice…I’d be impressed with anyone who notices their PC is 5% slower!
=> http://en.wikipedia.org/wiki/PaX
Some of its features have even been accepted by Microsoft! (Which some of you know, have been publically smearing open-source for the last five years!..I guess open-source is only good when THEY use it). :
The concept/feature that MS is “borrowing”, is Address Space Layout Randomization (ASLR). This will be in Windows Vista. (It is already implemented from Beta 2 release and newer)…
But as with any security solution coming from Microsoft, I’m very suspicious as to how effective their implementation of ASLR really is. (They tend to push out alot of marketing fluff to compensate for the deficiencies in their products).
For Windows 2k/XP/2k3 users, you can consider products like Wehnus, BufferShield, and StackGuard to do the same job…I suspect these do a better job than Vista’s implementation. (All of them are based on PaX, but ported to Windows).
The problem is, none of these are truely free. (Yes, I’ve tried them all)
-
Wehnus’s WehnTrust has limitations in its “free for home users” version (I think the project has ceased development as no one is responding to my bug reports, and there hasn’t been a new version in quite a while).
-
BufferShield’s ASLR only works with Win2k3 SP1, and its only available as a trial version.
-
StackDefender is only available as trial version.
If Comodo is able to implement such technology into their Personal Firewall (maybe their AV?) or even as another Free product, you’d have a pretty competitive solution.
(No company can really compete with FREE).
At least, one will then be able to stand a chance against the majority/common BO-based threats.
As I said PaX is open-source, so Comodo can download the source code, see what makes it tick, and implement their own version on Windows.
OT: By the way, you folks should take a look at this.
http://www.tuxedo-es.org/blog/2006/06/15/vista-probe-01-released/
http://www.tuxedo-es.org/blog/2006/07/06/vista-probe-02-release/
The original source code was written by Joanna Rutkowska. If you didn’t know, she was the first “security researcher” (hacker) to publically demonstrate how to compromise Windows Vista. (This was in a Black Hat Conference back in August)…Effectively, she squashed Microsoft’s marketing hoopla on Vista’s security.