this post was submitted on 22 Jul 2024
808 points (100.0% liked)

196

16359 readers
2246 users here now

Be sure to follow the rule before you head out.

Rule: You must post before you leave.

^other^ ^rules^

founded 1 year ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 19 points 2 months ago* (last edited 2 months ago) (2 children)

Strictly speaking, it's not anti-virus software. It's not designed to prevent malicious software from running or remove it. It's just monitoring for behavior that looks malicious so it can notify the system administrator and they can take manual action.

Most of the actual proprietary value, ironically enough, is in data files like the one that broke it. Those specify the patterns of behavior that the software is looking for. The software itself just reads those files and looks at the things they tell it to. But that's where the bug was: in the code that reads the files.

[–] [email protected] 7 points 2 months ago

I wouldn't call it a bug.

Any software running in kernel mode needs to be designed very carefully, because any error will crash the entire system.

The software is risky because it needs to run in kernel mode to monitor the entire system, but it also needs to run unsigned code to be up to date with new threats as they are discovered.

The software should have been designed to verify that the files are valid, before running them. Whatever sanity checks they might have done on the files, it clearly wasn't thorough enough.

From my reading, this wasn't an unforeseeable bug, but a known risk that was not properly designed around.

[–] [email protected] 2 points 2 months ago (1 children)

Bet they use it to spy on workers looking for "slacker behavior".

[–] [email protected] 3 points 2 months ago (1 children)

It's installed mainly on servers which is why it broke everything on Friday.

[–] [email protected] 1 points 2 months ago

It's still run on pcs, at least is in mine.