「綠壩-花季護航」是個什麼東東不需要我來介紹了,這兩天網上談的很多。 密執安大學的三位研究人員對這個網路過濾軟體進行了12個小時的剖析,就發現了兩個重大安全隱患。 昨天(6月11日)這三位研究人員發表了一篇分析報告,指出該軟體存在著兩個嚴重的安全漏洞,讓黑客輕易地遠程控制計算機(國內術語:變成「肉雞」)。 該過濾軟體的敏感辭彙組在自動升級的過程中軟體廠亦家可以獲得計算機的控制權(這與中國官方宣傳大相徑庭)。 另外,由於敏感辭彙組自動升級過程使用不保密的HTTP,黑客也可以混水摸魚,加入其過程,塞進他們的黑貨。 這些錯誤是編程人員使用陳舊落後的編程技術所造成。
該報告建議所有已安裝「綠壩-花季護航」的戶立即卸載,以保護計算機的安全。 該報告的結束語強調,如果把「綠壩-花季護航」的目前這個版本普遍安裝到中國的計算機上,將會嚴重影響中國的計算機安全。 而廠家生產出安全補丁或發布新的版本需要大量的時間來反覆驗證和測試。 由於中國政府要求普遍安裝「綠壩-花季護航」的日期是7月1日,廠家已經沒有時間在此日期前推出安全補丁或發布新的版本了。
。 以下是英文原文摘要:
Analysis of the Green Dam Censorware System
Computer Science and Engineering Division
The University of Michigan Revision 2.4 – June 11, 2009
Summary We have discovered remotely-exploitable vulnerabilities in Green Dam, the censorship software reportedly mandated by the Chinese government. Any web site a Green Dam user visits can take control of the PC.
According to press reports, China will soon require all PCs sold in the country to include Green Dam. This software monitors web sites visited and other activity on the computer and blocks adult content as well as politically sensitive material.
We examined the Green Dam software and found that it contains serious security vulnerabilities due to programming errors. Once Green Dam is installed, any web site the user visits can exploit these problems to take control of the computer. This could allow malicious sites to steal private data, send spam, or enlist the computer in a botnet. In addition, we found vulnerabilities in the way Green Dam processes blacklist updates that could allow the software makers or others to install malicious code during the update process.
We found these problems with less than 12 hours of testing, and we believe they may be only the tip of the iceberg. Green Dam makes frequent use of unsafe and outdated programming practices that likely introduce numerous other vulnerabilities. Correcting these problems will require extensive changes to the software and careful retesting. In the meantime, we recommend that users protect themselves by uninstalling Green Dam immediately.