[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Alan Coopersmith: BoS: Yet Another Java security bug




------- Forwarded Message

From: [email protected] (David Hopwood)
Newsgroups: comp.lang.java,comp.security.misc,comp.security.unix
Subject: Another Java security bug
Date: 2 Jun 1996 07:15:06 GMT
Organization: Oxford University, England
Lines: 30
Sender: [email protected]
Message-ID: <[email protected]>

There is another serious security bug in the class loading code for all
currently available Java browsers:
    Netscape up to and including versions 2.02 and 3.0beta4 (except for
      Windows 3.x)
    Oracle PowerBrowser for Win32
    HotJava 1.0beta
    'appletviewer' from the Java Development Kit, up to and including
      version 1.0.2

Sun, Netscape, and Oracle have been sent details of the problem (which is
partly related to the ClassLoader attack found by Drew Dean et al in
March). The attack works by exploiting a design flaw in the mechanism that
separates JVM classes into different namespaces.

Using this bug, an attacker can bypass all of Java's security
restrictions. This includes executing native code on the client, with
the same permissions as the user of the browser. No preconditions are
necessary other than viewing the attacker's web page, and the process
can be made completely invisible to the victim.

The only way to avoid this problem at the moment is to disable Java. For
more information see
    http://ferret.lmh.ox.ac.uk/~david/java/bugs/

Further technical details will be posted when Sun, Netscape, and Oracle
release patches.

David Hopwood
[email protected]
http://ferret.lmh.ox.ac.uk/~david/

------- End of Forwarded Message