Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • IT Management

    Report: Widgets Will Be Your Next Woe

    Written by

    Lisa Vaas
    Published September 17, 2007
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Widgets—those fun, graphic little applications that bring things like clocks and calculators to your desktop—are all plagued with lousy security and stand ready to unleash the next wave of malware onto users systems, according to new research.

      The security holes in these applications already have opened up: Microsofts MS07-048 advisory, put out on Augusts Patch Tuesday, addressed a vulnerability in Vistas Feed Headlines Gadget that could have let in malicious RSS feeds or links. Apple, of Cupertino, Calif., patched its WebKit browser engine in June. WebKit serves as an engine not only for Safari but also for Dashboard—a set of widgets that delivers real-time weather, stock tickers, flight status and other information.

      Now Finjan is reporting that new attacks exploiting widget and gadget insecurities in all types of environments—including operating systems such as Vista, third-party applications and Web widgets—are imminent and that the only thing that will stop the mayhem is a revised security model.

      “All types of widget environments … were found to be plagued with inadequate security models that allowed malicious widgets to run. In addition, we have found vulnerable widgets that were already available (some in the default installation) in the widget environment. These examples clearly show that the design and development of these mini-applications was missing some security considerations,” the security companys Malicious Code Research Center reported in its Third Quarter Web Security Trends Report.

      Finjan has been on this awhile: Microsoft, of Redmond, Wash., credits the security firm for its work behind the MS07-048 patch, and Finjan researchers Aviv Raff and Iftach Ian Amit presented a talk on the subject at DefCon Aug. 5, titled “The Inherent Insecurity of Widgets and Gadgets.”

      To read more about Yahoos update to plug a security hole in widgets, click here.

      Widgets and gadgets, Finjan says, are loosely based on Web models, such as HTML-like presentation and rendering and JavaScript-like APIs. Unsurprisingly, the types of vulnerabilities they bring to a system are similar to those found on the Web. But widget and gadget engines magnify the threat, given that they share a much broader connectivity with an underlying operating system, at least in the case of native operating system widgets and those from third-party widget engines.

      This enables a powerful attack vector capable of gaining privileged access to local resources by default, Finjan says.

      Finjan, located in San Jose, Calif., has found scads of security soft spots to date. One that has since been fixed is a Contacts widget pre-installed in all flavors of Vista Sidebar. By providing a malformed, innocent-looking contact, an attacker could run code on a victimized system by simply having the contact displayed on the machine—no user interaction is required.

      Another Microsoft soft spot is Live.com, a new, customizable portal that displays recent headlines from an RSS feed, a brief summary of a Hotmail account inbox, local weather forecasts and the like. The RSS reader widget was vulnerable to swallowing malicious commands sent via data feed by attackers who could then gain access to privileged information from the user account, impersonating the user and taking over the browser.

      Yahoos widget engine is another one that has shown squishy security. That technology, based on Konfabulator, can be installed as a third-party application and will bring widget capabilities to operating systems that dont have a native widget engine. At one point, Yahoos widgets engine had a vulnerability in its Contacts widget that again allowed attackers to run through unsanitized script, Finjan says.

      Finjan is expecting attacks via widgets and gadgets to ramp up, particularly given their ubiquity—theyre found on iGoogle, Live.com, Yahoo, Vista and on Mac operating systems.

      Finjans MCRC is recommending that users stay away from nontrusted third-party widgets and that they be treated as full-blown applications, with all the power to own a system that that implies. Theyre also recommending caution when using interactive widgets, given that their reliance on external feeds such as RSS or weather information might open the door to attacks that piggyback malicious payloads onto trusted content.

      As for security policy, Finjan wants to see strict policies around widgets and widget engines. “Since these are not considered business critical applications, or even productivity enhancers in some cases, the use of widgets and gadgets by corporate users should be limited,” the MCRC says in its report. Also, widgets and gadgets should be blocked at the gateway, Finjan says, to keep them off corporate networks.

      “Vendors and users alike must realize that every application—even if its small and made mostly for the sake of visual entertainment—represents a potential security threat,” the MCRC says in its report. “Vulnerabilities in widgets and gadgets enable attackers to gain control of user machines, and thus should be developed with security in mind, so that users can enjoy the benefits of these advancements. This attack vector could have a major impact on the industry, immediately exposing corporations to a vast array of new security considerations that need to be dealt with. Businesses require security solutions [that] are capable of coping with such a changing environment, analyze code in real time, and detect malicious code appearing in such innovative attack vectors can provide adequate protection for these businesses.”

      Check out eWEEK.coms Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEKs Security Watch blog.

      Lisa Vaas
      Lisa Vaas
      Lisa Vaas is News Editor/Operations for eWEEK.com and also serves as editor of the Database topic center. She has focused on customer relationship management technology, IT salaries and careers, effects of the H1-B visa on the technology workforce, wireless technology, security, and, most recently, databases and the technologies that touch upon them. Her articles have appeared in eWEEK's print edition, on eWEEK.com, and in the startup IT magazine PC Connection.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×