Java security not so hot?


[23 February 1996] Two security flaws in recently released Java support were circulated on 18 February by Drew Dean, Ed Felten, and Dan Wallach of Princeton University. A flaw in Netscape Navigator 2.0 and the 1.0 release of the Java Development Kit from Sun permits a malicious applet to open a connection to arbitrary Internet hosts; potentially permitting exploitation of bugs in any TCP/IP-based network service (e.g. sendmail). If the applet is executed on a machine behind a firewall, machines on the same side of firewall may be attacked in this way. The second flaw occurs in the bytecode dissassembler, javap. A long method name can overflow a stack allocated buffer, potentially permitting arbitrary native code to be executed. Both flaws can be avoided by disabling Java until patches are made available. Dean and Felten will present a paper on security flaws in versions of Java and the HotJava browser at this year's Oakland Conference. Details of a third serious flaw, reported by the same group on March 23, are being withheld pending development and distribution of appropriate patches. More information on these flaws is available at http://www.cs.princeton.edu/~ddean/java