Alan Coopersmith: BoS: Yet Another Java security bug

Perry E. Metzger perry at piermont.com
Tue Jun 4 10:49:13 PDT 1996



------- Forwarded Message

From: lady0065 at sable.ox.ac.uk (David Hopwood)
Newsgroups: comp.lang.java,comp.security.misc,comp.security.unix
Subject: Another Java security bug
Date: 2 Jun 1996 07:15:06 GMT
Organization: Oxford University, England
Lines: 30
Sender: david.hopwood at lmh.ox.ac.uk
Message-ID: <4orf1q$t6f at news.ox.ac.uk>

There is another serious security bug in the class loading code for all
currently available Java browsers:
    Netscape up to and including versions 2.02 and 3.0beta4 (except for
      Windows 3.x)
    Oracle PowerBrowser for Win32
    HotJava 1.0beta
    'appletviewer' from the Java Development Kit, up to and including
      version 1.0.2

Sun, Netscape, and Oracle have been sent details of the problem (which is
partly related to the ClassLoader attack found by Drew Dean et al in
March). The attack works by exploiting a design flaw in the mechanism that
separates JVM classes into different namespaces.

Using this bug, an attacker can bypass all of Java's security
restrictions. This includes executing native code on the client, with
the same permissions as the user of the browser. No preconditions are
necessary other than viewing the attacker's web page, and the process
can be made completely invisible to the victim.

The only way to avoid this problem at the moment is to disable Java. For
more information see
    http://ferret.lmh.ox.ac.uk/~david/java/bugs/

Further technical details will be posted when Sun, Netscape, and Oracle
release patches.

David Hopwood
david.hopwood at lmh.ox.ac.uk
http://ferret.lmh.ox.ac.uk/~david/

------- End of Forwarded Message







More information about the cypherpunks-legacy mailing list