💾 Archived View for spam.works › mirrors › textfiles › internet › javabug.txt captured on 2023-11-14 at 10:24:31.
⬅️ Previous capture (2023-06-14)
-=-=-=-=-=-=-
NASIRC BULLETIN B-96-24 June 10, 1996 JAVA Class Loader Hole Recently Discovered =========================================================== NASA Automated Systems Incident Response Capability __ __ __ ___ ___ ____ ____ /_/\ /_/| /_/\ / _/\ /_/| / __/ \ / __/\ | |\ \| || / \ \ | /\/ | || | /\ \/ | | \/ | ||\ \ || / /\ \ \ \ \ | || |_\/ /\ | | | || \ \|| / /--\ \ \ /\_\\ | || | |\ \ \ | \_/\ |_|/ \_|//_/ \_\/ \/__/ |_|/ |_| \_\/ \___\/ Serving NASA and the International Aerospace Communities =========================================================== This bulletin reports a recently announced security vulner- ability. It may contain a workaround or software patch. Bulletins should be considered urgent as vulnera- bility information is likely to be widely known by the time a patch is issued or other solutions are developed. =========================================================== NASIRC has recently received new information about another attack method using the class loader of Java. This attack enables execution of native machine instructions with Java capable browsers. This discovery expands the scope of vulnerable systems initially identified for Netscape Version 2.02 browsers, reported in NASIRC Bulletin B-96-11-C. PROBLEM DESCRIPTION Attacks on the class loader allow running native code in current Java implementations. Running native code allows machine specific instructions to be executed by the delivered applet. This presents a problem since an attack was successful in deleting files. An exploit has been written for Appletviewer and HotJava; versions for Netscape and Oracle PowerBrowser are also possible, although more difficult. SYSTEMS AFFECTED The native code vulnerability applies to currently available Java capable browsers. The following systems are known to be vulnerable to the new attack: * Netscape up to and including Versions 2.02 and 3.0beta4 (except Windows 3.x). * Oracle PowerBrowser for Win32. * HotJava 1.0 beta. * "appletviewer" from Java Development Kit, up to and including Version 1.0.2. RECOMMENDED ACTION NASIRC reiterates its recommendation to use all Internet browsers with all Java and JavaScript features disabled. If the known host is a trusted site, then enabling Java or JavaScript after the initial page is displayed and then using the "reload" option to invoke Java or JavaScript is a safer approach. Before leaving a trusted page, the Java and JavaScript features should again be disabled. Technical Paper about Java Security Drew Dean, Edward Felten, and Dan Wallach, Department of Computer Science, Princeton University, have written a paper, "Java Security: From HotJava to Netscape and Beyond," presented at the IEEE Symposium on Security and Privacy on Oakland, California, on May 6-8, 1996. This paper gives a technical description of the weaknesses that exist in the security methods used to build Java and that can be obtained from the following site. http://www.cs.princeton.edu/sip/pub/secure96.html The conclusion is as follows: "6. Conclusion Java is an interesting new programming language designed to support the safe execution of applets on Web pages. We and others have demonstrated an array of attacks that allow the security of both HotJava and Netscape to be compromised. While many of the specific flaws have been patched, the overall structure of the systems leads us to believe that flaws will continue to be found. The absence of a well-defined, formal security policy prevents the verification of an implementation. We conclude that the Java system in its current form cannot easily be made secure. Significant redesign of the language, the bytecode format, and the runtime system appear to be necessary steps toward building a higher-assurance system. Without a formal basis, statements about a systems security cannot be definitive. The presence of flaws in Java does not imply that competing systems are more secure. We conjecture that if the same level of scrutiny had been applied to competing systems, the results would have been similar. Execution of remotely-loaded code is a relatively new phenomenon, and more work is required to make it safe." -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- ACKNOWLEDGMENTS: Fred Blonder of NASIRC for identifying this information, Alan Coopersmith of UC Berkeley for submitting this to best-of-security@suburbia.net, and David Hopwood of Oxford University, England, for maintaining a Web site of Netscape vulnerability information. Drew Dean, Edward Felten, and Dan Wallach, Department of Computer Science, Princeton University, for publishing "Java Security: From HotJava to Netscape and Beyond." BULLETIN AUTHOR: Jordan Gottlieb -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- This advisory may be forwarded without restriction. Persons within the NASA community or operating in support of a NASA contract may contact NASIRC with any questions about this advisory. Telephone: 1-800-7-NASIRC (1-800-762-7472) FAX: 1-301-441-1853 International: +1-301-441-4398 STU III: 1-301-982-5480 Internet E-Mail: nasirc@nasa.gov 24-Hour/Emergency Pager: 1-800-759-7243/Pin:2023056 WWW: http://nasirc.nasa.gov/NASIRC_home.html FTP: nasirc.nasa.gov, login "anonymous" Anyone requiring assistance or wishing to report a security incident but not operating in support of NASA may contact the Forum of Incident Response and Security Teams (FIRST), an international organization of incident response teams, to determine the appropriate team. A list of FIRST member organizations and their constituencies may be obtained by sending E-mail to "docserver@first.org" with an empty "subject" line and a message body containing the line "send first-contacts" or via WWW at http://www.first.org/ . -------------------------------------------------------------