Closed GoogleCodeExporter closed 8 years ago
Issue 530 has been merged into this issue.
Original comment by tav...@google.com
on 9 Oct 2015 at 5:47
Update from Kaspersky:
Hi Tavis,
Thank you again for this report! We’ve reviewed Network Attack Blocker
feature based on your input. Indeed there are some signatures that didn’t not
check packet for attributes such session id or other. We are in a process of
reviewing all feature’s signatures to make sure that they block remote hosts
only if following conditions are met:
· packet belongs to a valid TCP session
· it’s a successfully initiated TCP session
· it’s an inbound TCP session
In all other cases remote host won’t be blocked.
We will release such fix shortly. I’ll update you on a date of this release
on Friday.
Best regards,
Igor
Original comment by tav...@google.com
on 9 Oct 2015 at 5:47
I pointed out that they also monitor UDP and ICMP, and must disable that, they
responded:
Hi Tavis,
We will release a fix for the first set of signatures in next few days. All
signatures will be checked and corrected if required by 9-Oct. By this date we
make sure that blocks are done only for TCP according to the conditions below
(no blocks for UDP, ICMP or others)
Thanks,
Igor
Original comment by tav...@google.com
on 9 Oct 2015 at 5:48
Attaching screenshot for reference.
Original comment by tav...@google.com
on 9 Oct 2015 at 5:49
Attachments:
Kaspersky have scheduled the final fix for this to be released today, so
removing view-restrictions.
Original comment by tav...@google.com
on 9 Oct 2015 at 5:51
So your released the issue before the actual fix is available? Poor form.
Original comment by sonicwal...@gmail.com
on 10 Oct 2015 at 9:13
I think you're confused. The fix was available on October 8th, the issue was
reported on September 11th. The issue was released on October 9th.
This schedule follows our documented disclosure policies.
Original comment by tav...@google.com
on 10 Oct 2015 at 9:45
I am surprised that these anti-virus software manufacturers don't take security
seriously. In addition to making some trivial mistakes, I have not seen any
public advisories or CVEs from them regarding these issues.
Original comment by athmi...@gmail.com
on 11 Oct 2015 at 9:27
Good work is appreciated.
A Kaspersky user since 8 years.
So far, we have been living with a false sense of security.
I am glad that Kaspersky is taking corrective actions.
Original comment by vakhari...@gmail.com
on 12 Oct 2015 at 8:24
Original issue reported on code.google.com by
tav...@google.com
on 9 Oct 2015 at 5:47Attachments: