5451
General Software Discussion / Re: Open Source Sorftware Security
« Last post by f0dder on March 25, 2008, 09:07 AM »Hm, I don't know if there has been exploits for Foxit Reader (or Sumatra, which is both freeware and open-source) - but Acrobat Reader has had security hole(s) that were exploitable by maliciously crafted .pdf files.
Whether open-source software is more or less secure than closed-source software is hard to answer, imho. One advantage is that once an exploit is publically found, a patch can typically be released pretty fast (partially because to FOSS community doesn't do/has to do the same level of compatibility testing as some commercial vendors).
There's also the theoretical advantage that "because the code is there, everybody can audit it[/i] - problem is that this doesn't happen automatically, and exploitable bugs like the "Transfer-Encoding: chunked" apache bug was iirc present for several years before it was discovered (publically...) and patched.
The openness of FOSS can also be a problem. Even though there's some interesting binary analysis tools available, it's easier to audit source code than executable files. If blackhats manage to find a relatively obscure bug and keep it to themselves, they have an attack vector that could go undetected for quite a while. And keep in mind that it's not just the big projects (which usually have code reviews) that can have interesting attack vectors.
Whether open-source software is more or less secure than closed-source software is hard to answer, imho. One advantage is that once an exploit is publically found, a patch can typically be released pretty fast (partially because to FOSS community doesn't do/has to do the same level of compatibility testing as some commercial vendors).
There's also the theoretical advantage that "because the code is there, everybody can audit it[/i] - problem is that this doesn't happen automatically, and exploitable bugs like the "Transfer-Encoding: chunked" apache bug was iirc present for several years before it was discovered (publically...) and patched.
The openness of FOSS can also be a problem. Even though there's some interesting binary analysis tools available, it's easier to audit source code than executable files. If blackhats manage to find a relatively obscure bug and keep it to themselves, they have an attack vector that could go undetected for quite a while. And keep in mind that it's not just the big projects (which usually have code reviews) that can have interesting attack vectors.

Recent Posts


