- Dec 8, 2014
- 206
1. Almost every machine is affected by that (human error?). Microsoft is constantly shipping a certificate revocation list (it seems to be used somehow by Comodo).Theoretically there are several ways to attack such default deny approach that the government can undertake (easily?) if they want.
1. Steal/Get a bogus certificate. COMODO's trust list contains literally tons of certificates, sometimes I don't even know if they actually check what is on their list. This was what happened to the Bit9 hack incident. COMODO users you can open your trusted certificate list and look at what COMODO has been trusting. I don't think you would know more than 10% of them
2. Find a vulnerability/exploit in COMODO itself. I don't really know how well designed is the COMODO code base, so we won't know how easy is this. But with each release fixing 300+ bugs is not helping my confidence.
3. Use a kernel exploit to own practically any security. Not sure how COMODO's new hypervisor based security layer is going to fare against this though, I haven't had the time to test it. This has to be tested in a real system, not VM because of conflicts.
https://en.wikipedia.org/wiki/Revocation_list
Viruscope technology might come in handy here in the future.
You can find a list of deleted vendors here (which I was able to get by utilizing Wireshark ; not sure if the method is accurate): https://cdn.download.comodo.com/av/tvl/deletedvendors.txt
2. Joxean Koret has performed a recent audit. http://joxeankoret.com/download/breaking_av_software_44con.pdf
There are some minor vulnerabilities regarding Comodo. The number is quite low (lowest?) compared to other vendors.
I've tested some and these appear to be alleviated (although some are still existent). One example is the bzip2 decompresion bomb vulnerability which does not crash the scanner-- instead, the scanner is timed out for approximately 10 minutes and is aborted automatically.
Overall, the new version is better in terms of fixed flaws (although these were not mentioned but discovered by individuals).
3. Does anyone offer such degree of protection for free? I don't know of any.
The number of fixed issues represent the ones in the tracker. If you've noticed, the changelog usually contains issues reported by the community (publicly, privately).
Last edited: