home *** CD-ROM | disk | FTP | other *** search
-
- NASIRC BULLETIN B-96-24 June 10, 1996
-
- JAVA Class Loader Hole Recently Discovered
- ===========================================================
- NASA Automated Systems Incident Response Capability
- __ __ __ ___ ___ ____ ____
- /_/\ /_/| /_/\ / _/\ /_/| / __/ \ / __/\
- | |\ \| || / \ \ | /\/ | || | /\ \/ | | \/
- | ||\ \ || / /\ \ \ \ \ | || |_\/ /\ | |
- | || \ \|| / /--\ \ \ /\_\\ | || | |\ \ \ | \_/\
- |_|/ \_|//_/ \_\/ \/__/ |_|/ |_| \_\/ \___\/
- Serving NASA and the International Aerospace Communities
- ===========================================================
-
- This bulletin reports a recently announced security vulner-
- ability. It may contain a workaround or software
- patch. Bulletins should be considered urgent as vulnera-
- bility information is likely to be widely known by the time
- a patch is issued or other solutions are developed.
-
- ===========================================================
-
-
- NASIRC has recently received new information about another attack
- method using the class loader of Java. This attack enables
- execution of native machine instructions with Java capable
- browsers. This discovery expands the scope of vulnerable systems
- initially identified for Netscape Version 2.02 browsers, reported
- in NASIRC Bulletin B-96-11-C.
-
-
-
- PROBLEM DESCRIPTION
-
-
- Attacks on the class loader allow running native code in current
- Java implementations. Running native code allows machine
- specific instructions to be executed by the delivered applet.
- This presents a problem since an attack was successful in
- deleting files. An exploit has been written for Appletviewer and
- HotJava; versions for Netscape and Oracle PowerBrowser are also
- possible, although more difficult.
-
-
-
-
- SYSTEMS AFFECTED
-
-
- The native code vulnerability applies to currently available Java
- capable browsers.
-
- The following systems are known to be vulnerable to the new
- attack:
-
- * Netscape up to and including Versions 2.02 and 3.0beta4
- (except Windows 3.x).
-
- * Oracle PowerBrowser for Win32.
-
- * HotJava 1.0 beta.
-
- * "appletviewer" from Java Development Kit, up to and
- including Version 1.0.2.
-
-
-
- RECOMMENDED ACTION
-
-
- NASIRC reiterates its recommendation to use all Internet browsers
- with all Java and JavaScript features disabled. If the known
- host is a trusted site, then enabling Java or JavaScript after
- the initial page is displayed and then using the "reload" option
- to invoke Java or JavaScript is a safer approach. Before leaving
- a trusted page, the Java and JavaScript features should again be
- disabled.
-
-
-
-
- Technical Paper about Java Security
-
-
- Drew Dean, Edward Felten, and Dan Wallach, Department of Computer
- Science, Princeton University, have written a paper, "Java
- Security: From HotJava to Netscape and Beyond," presented at the
- IEEE Symposium on Security and Privacy on Oakland, California, on
- May 6-8, 1996.
-
- This paper gives a technical description of the weaknesses that
- exist in the security methods used to build Java and that can be
- obtained from the following site.
-
-
- http://www.cs.princeton.edu/sip/pub/secure96.html
-
-
-
- The conclusion is as follows:
-
- "6. Conclusion
-
- Java is an interesting new programming language
- designed to support the safe execution of applets
- on Web pages. We and others have demonstrated an
- array of attacks that allow the security of both
- HotJava and Netscape to be compromised. While many
- of the specific flaws have been patched, the
- overall structure of the systems leads us to believe
- that flaws will continue to be found. The absence of
- a well-defined, formal security policy prevents the
- verification of an implementation.
-
- We conclude that the Java system in its current form
- cannot easily be made secure. Significant redesign of
- the language, the bytecode format, and the runtime
- system appear to be necessary steps toward building a
- higher-assurance system. Without a formal basis,
- statements about a systems security cannot be
- definitive.
-
- The presence of flaws in Java does not imply that
- competing systems are more secure. We conjecture that
- if the same level of scrutiny had been
- applied to competing systems, the results would have
- been similar. Execution of remotely-loaded code is
- a relatively new phenomenon, and more work is required
- to make it safe."
-
-
-
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- ACKNOWLEDGMENTS: Fred Blonder of NASIRC for identifying
- this information, Alan Coopersmith of UC Berkeley
- for submitting this to
- best-of-security@suburbia.net, and David Hopwood
- of Oxford University, England, for maintaining a
- Web site of Netscape vulnerability information.
- Drew Dean, Edward Felten, and Dan Wallach,
- Department of Computer Science, Princeton
- University, for publishing "Java Security: From
- HotJava to Netscape and Beyond."
-
-
- BULLETIN AUTHOR: Jordan Gottlieb
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
-
- This advisory may be forwarded without restriction. Persons
- within the NASA community or operating in support of a NASA
- contract may contact NASIRC with any questions about this
- advisory.
-
- Telephone: 1-800-7-NASIRC (1-800-762-7472) FAX: 1-301-441-1853
- International: +1-301-441-4398 STU III: 1-301-982-5480
- Internet E-Mail: nasirc@nasa.gov
- 24-Hour/Emergency Pager: 1-800-759-7243/Pin:2023056
- WWW: http://nasirc.nasa.gov/NASIRC_home.html
- FTP: nasirc.nasa.gov, login "anonymous"
-
- Anyone requiring assistance or wishing to report a security
- incident but not operating in support of NASA may contact the
- Forum of Incident Response and Security Teams (FIRST), an
- international organization of incident response teams, to
- determine the appropriate team. A list of FIRST member
- organizations and their constituencies may be obtained by
- sending E-mail to "docserver@first.org" with an empty "subject"
- line and a message body containing the line "send first-contacts"
- or via WWW at http://www.first.org/ .
-
- -------------------------------------------------------------
-
-