Vulnerability plagues Java implementationsApr 05, 1999, 14:24 (4 Talkback[s])
(Other stories by Gary McGraw)
Gary McGraw posted to BUGTRAQ:
Karsten Sohr at the University of Marburg in Germany (email firstname.lastname@example.org) has discovered a very serious security flaw in several current versions of the Java Virtual Machine, including Sun's JDK 1.1 and Java 2 (a.k.a. JDK 1.2), and Netscape's Navigator 4.x. (Microsoft's latest JVM is not vulnerable to this attack.) The flaw allows an attacker to create a booby-trapped Web page, so that when a victim views the page, the attacker seizes control of the victim's machine and can do whatever he wants, including reading and deleting files, and snooping on any data and activities on the victim's machine.
The flaw is in the "byte code verifier" component of the JVM. Under some circumstances the verifier fails to check all of the code that is loaded into the JVM. Exploiting the flaw allows the attacker to run code that has not been verified. This code can set up a type confusion attack (see our book "Securing Java" for details http://www.securingjava.com) which leads to a full-blown security breach.
We have verified that the flaw exists and is serious. Attack code (in both applet and application form) has been developed in the lab to exploit the flaw. Sun and Netscape have been notified about the flaw and they are working on a fix.
The attack we developed in the lab worked against the following
The attack did not work against:
Kudos to Viren Shah at RST for extensive platform testing. Thanks for your interest in mobile code security.
Dr. Gary McGraw Prof. Edward W. Felten Reliable Software Technologies Secure Internet Programming Lab email@example.com Dept. of Computer Science Princeton University http://www.securingjava.com firstname.lastname@example.org