85339 2002-11-25 20:35 /88 rader/ Last Stage of Delirium <contact@lsd-pl.net> Importerad: 2002-11-25 20:35 av Brevbäraren Extern mottagare: bugtraq@securityfocus.com Mottagare: Bugtraq (import) <2529> Ärende: [LSD] Java and JVM security vulnerabilities ------------------------------------------------------------ We would like to inform you about several security vulnerabilities in Java Virtual Machine implementations that we have found during our research. These vulnerabilities affect at least JVMs used in Netscape Communicator and Microsoft Internet Explorer web browsers. Below you can find their brief descriptions: [1] - JIT bug (it affects Netscape Communicator 4.0-4.8 on Win32/x86 platform) Its successfull exploitation allows for complete circumvention of the Java type safety rules. In a result of this, applet sandbox restrictions can be also escaped and malicious actions can be taken on the computer of the victim user. [2] - Bytecode Verifier vulnerability (it affects Microsoft Internet Explorer 4.0-6.0 including VM build 3805) Its successfull exploitation allows for complete circumvention of the Java type safety rules. In a result of this, applet sandbox restrictions can be also escaped and malicious actions can be taken on the computer of the victim user. [3] - Bytecode Verifier vulnerability (it affects SUN JDK 1.1-1.4, Netscape Communicator 4.0-4.8 on Win32 and Unix systems) Its successfull exploitation allows to gain read and write access to local file system. It also allows to bypass applet sandbox restrictions with regard to network access (socket, bind, listen, accept and connect calls). On Win32 platform, this vulnerability can be exploited in such a way so that complete circumvention of the Java type safety rules can be done. In a result of this, applet sandbox restrictions can be also escaped and malicious actions can be taken on the computer of the victim user. Although this vulnerability also affects JDK 1.x from SUN, we haven't found a way to successfully exploit it under Netscape 6.x and Appletviewer. [4] - Bad implementation of system classes (it affects Netscape Communicator 4.0-4.8 on Win32 and Unix systems) It allows for arbitrary loads of user provided libraries. When combined with the previous Bytecode Verifier vulnerability it can be used to deploy and execute arbitrary programs on the computer of the victim user. More details with regard to each of the above vulnerabilities can be found in our technical paper that can be downloaded from our website: http://lsd-pl.net/java_security.html This paper was published for the first time on October 3rd 2002. It was presented during our talk at Asia Black Hat Briefings conference in Singapore. Along with the paper, we also plan to release proof of concept codes for all of the vulnerabilites that are discussed in it. But this will be done in about 1 week time from now. On September 2nd we notified JVM vendors (SUN, Microsoft and Netscape) about the vulnerabilities that we have found. Along with that we provided them with a pre-release copy of our paper. Up to this time we have not received ANY response from Microsoft as well as Netscape with regard to the reported issues (vendors were given 30 days time to prepare patches). Only SUN replied to our notification and informed us that proper patches would be prepared for these issues. We can understand why there was no response from Netscape since the three [1] [3][4] vulnerabilities affecting Netscape web browser were submitted to the Netscape Bug Bounty program which entitles 1000 USD for a security bug in Netscape Communicator to its founder. Netscape seems to be another American company that does not seem to be fulfilling public obligations made through company's web pages (http://home.netscape.com/security/bugbounty.html). While we were waiting for Netscape's reponse to our vulnerability report, Netscape changed(!) Reward Guidelines of the Bug Bounty program so that now only bugs in Netscape 7.x are rewarded (previously both latest 6.x and 4.8 versions were taken into account). Nice move, huh ? Netscape cannot of course beat Argus Systems who after 18 months still has not paid us the remaining 45000 USD of the prize money won by us during the 5th Argus Hacking Challenge (please see http://lsd-pl.net/argus.html for more information on this subject). Best Regards, Members of LSD Research Group http://lsd-pl.net (85339) /Last Stage of Delirium <contact@lsd-pl.net>/(Ombruten) 85441 2002-11-27 10:23 /30 rader/ Jouko Pynnonen <jouko@solutions.fi> Importerad: 2002-11-27 10:23 av Brevbäraren Extern mottagare: bugtraq@securityfocus.com Mottagare: Bugtraq (import) <2545> Ärende: Netscape 4 Java buffer overflow ------------------------------------------------------------ The Java implementation of Netscape 4 contains a buffer overflow vulnerability. Arbitrary code may be run on a Netscape user's system when a web page containing a malicious applet is viewed. The buffer overflow happens in the method canConvert() of the class sun.awt.windows.WDefaultFontCharset. An applet may trigger the overflow by passing a long string to the constructor of the class and invoking the method canConvert() on the created instance. In Java: new WDefaultFontCharset(long_string).canConvert('x'); The vulnerability is trivial case of buffer overflow. Its exploitability has been confirmed with an exploit which runs a program when a web page is viewed. Netscape 4 has a very limited user base nowadays. Other Netscape versions use Sun Microsystem's Java Plug-in so they aren't vulnerable. This vulnerability only affects the Windows platform which limits the number of vulnerable systems further. The vulnerability doesn't appear exploitable on other browsers. Netscape and Sun Microsystems were informed about the problem in August 2002. Netscape 4 users can protect themselves from the flaw by disabling Java in Preferences. Jouko Pynnönen jouko@solutions.fi (85441) /Jouko Pynnonen <jouko@solutions.fi>/(Ombruten)