Java flaw is in bytecode verifier

From http://java.sun.com/sfaq/960327.html: Researchers at Princeton recently found an implementation bug in the Java bytecode Verifier. The Verifier is a part of Java's runtime system which certifies that applets downloaded over the Internet adhere to Java's language safety rules. Through a sophisticated attack, a malicious applet can exploit this bug to delete a file or do other damage.
This is one of the more worrisome places for a bug to exist. Much of Java's security rests in the claim that it can screen for and detect bad bytecode sequences. This screening code is extremely critical for Java security and I am surprised to see that it was implemented in a flawed manner. I've been writing Java quite a bit in the last couple of weeks, and I find that I have crashed my browser, whether Netscape or appletviewer, many times. Granted some of my code has been pretty buggy, but it's still not supposed to crash the browser. Obviously some of the runtime checks are not being done properly. I had expected that the bug would be in these areas, something like the stack overflows that we have seen cause problems in the past. A simple error in the bytecode verifier (if that is what this really is) seems like a more fundamental security flaw. The researchers have still not released full details on the bug, although they had planned to do so by the end of March. Maybe they are waiting for the fix to be distributed. Hal

My bet is currently on the flaw being due to a silly mistake in some part of the code dealing with returns from finally handlers. The Suspense Is Killing Me :) --- They say in online country So which side are you on boys There is no middle way Which side are you on You'll either be a Usenet man Which side are you on boys Or a thug for the CDA Which side are you on? National Union of Computer Operatives; Hackers, local 37 APL-CPIO
participants (2)
-
Hal
-
Simon Spero