Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Bug leaves Windows open to Java attack
Ziff Davis ^ | 04/10/03 | Matthew Broersma

Posted on 04/10/2003 3:46:58 PM PDT by Salo

Bug leaves Windows open to Java attack

12:30 Thursday 10th April 2003

Matthew Broersma 

Microsoft said that its Virtual Machine fails to catch certain malicious code in Java applets, allowing an attacker to take control of a PC

Microsoft has warned of three new flaws affecting its software, the most serious of which would allow an attacker to gain full control of a user's PC using a Java applet.

The three warnings, all issued on Wednesday, involve the Microsoft Virtual Machine for running Java applets on Windows; a cross-site scripting bug in a component of Windows 2000 and Windows NT 4.0; and a denial-of-service bug affecting Proxy Server 2.0 and ISA Server.

With the three alerts, Microsoft has issued 12 new warnings so far this year. Late last month the company issued patches for Windows and IIS.

The Virtual Machine (VM) flaw is the most serious, meriting a "critical" rating from Microsoft. The VM ships with most versions of Windows and some versions of Internet Explorer, and is used to run programs called "applets" written in Sun Microsystems' Java language.

A VM component called the ByteCode Verifier does not correctly check for the presence of certain malicious code when the applet is being loaded, meaning that an attacker could slip malicious code onto a user's PC. This malicious applet, which could be delivered via a Web page or an email, could allow the attacker to run code of his choice on the PC, doing anything from erasing the hard drive to implanting a "back door" leaving the machine vulnerable to future attacks.

Microsoft said that Windows installations containing the VM include Windows 95, Windows 98 and 98SE, Windows ME, Windows NT 4.0, beginning with Service Pack 1, Windows 2000 and Windows XP.

VM builds 5.0.3802 up to and including build 5.0.3809 were tested and found to be affected, although earlier builds are probably also vulnerable, the company said. The latest builds, 3810 and later, should be downloaded and installed in order to eliminate the vulnerability. Instructions for downloading and installing the software can be found on Microsoft's Web site.

Microsoft noted that for the exploit to work, the attacker would have to entice the user to view a malicious Web site or open a malicious email. Email clients that place restrictions on HTML content in messages, such as some newer versions of Outlook, would prevent the attack from succeeding.

Cross-site scripting bug

The Cross-site scripting (CSS) bug affects Microsoft Indexing Services for Windows 2000 and Windows NT 4.0. Cross-site scripting attacks were first publicised in February of 2000, and can affect a variety of different server-side software, enabling an attacker to insert malicious code into a user's browsing session via a trusted Web site.

Microsoft said that a component of Indexing Services called CiWebHitsFile is vulnerable to a CSS attack, and released a patch to fix it. Indexing Services is a search service integrated into Internet Information Server and Windows 2000.

Denial of service vulnerability

Microsoft's Proxy Server 2.0 and ISA Server contain a vulnerability that allows an attacker from within the network to put them out of commission using a specially-crafted data packet.

The packet causes the software to hit 100 percent CPU utilisation and stop responding to internal and external requests. While a reboot allows the software to function again, it is still vulnerable to the same attack.

Specifically, the two pieces of software both contain a flawed version of the Winsock Proxy service, which enables certain client-side applications to function as though they had a direct Internet connection, while routing their traffic through an internal server.

Microsoft released a patch for the bug on its Web site, and noted that while the attack could shut the servers down, it did not allow a hacker to gain any higher privileges or compromise any content cached on the server.


TOPICS: Business/Economy; Technical
KEYWORDS: computersecurityin; java; microsoft; security
Looks like more patching.
1 posted on 04/10/2003 3:46:58 PM PDT by Salo
[ Post Reply | Private Reply | View Replies]

To: All
A Strong Kick To The Finish!
(Leave The Left Behind)

Finish Strong. Donate Here By Secure Server

Or mail checks to
FreeRepublic , LLC
PO BOX 9771
FRESNO, CA 93794

or you can use

PayPal at Jimrob@psnw.com

STOP BY AND BUMP THE FUNDRAISER THREAD-
It is in the breaking news sidebar!

2 posted on 04/10/2003 3:47:48 PM PDT by Support Free Republic (Your support keeps Free Republic going strong!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rdb3; Bush2000
Pinging the penguin pinger.
3 posted on 04/10/2003 3:48:11 PM PDT by Salo (All we've been say-ying is give war a chance! Sing it with me!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Salo
Yep ... I already patched this one.
4 posted on 04/10/2003 3:48:18 PM PDT by Maedhros (Nelyafinwë)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Salo
Bug leaves Windows open to Java attack

So THAT'S how I ended up spilling coffee all over my keyboard.

5 posted on 04/10/2003 3:50:42 PM PDT by TomB
[ Post Reply | Private Reply | To 1 | View Replies]

To: TomB
Java Attack, thats when your computer takes control of you and you have an overwhelming need to consume coffee to keep up with the freerepublic ongoing threads.
6 posted on 04/10/2003 3:54:34 PM PDT by longtermmemmory
[ Post Reply | Private Reply | To 5 | View Replies]

To: *Computer Security In
http://www.freerepublic.com/perl/bump-list
7 posted on 04/10/2003 4:03:09 PM PDT by Libertarianize the GOP (Ideas have consequences)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Salo
Security Bulletin, with instructions and links to patches:
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-011.asp

End-user bulletin: http://www.microsoft.com/security/security_bulletins/ms03-011.asp

8 posted on 04/10/2003 4:48:31 PM PDT by TechJunkYard (via Blue)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TechJunkYard
Thanks for the links. I'll just kill java and activex at the firewall and be done with it once and for all. :-)
9 posted on 04/10/2003 6:39:07 PM PDT by Salo
[ Post Reply | Private Reply | To 8 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson