Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Windows :: bt1427.txt

Windows NT 4.0 with IBM JVM Denial of Service






----- Original Message ----- 
From: "@stake Advisories" <advisories@atstake.com>
To: <bugtraq@securityfocus.com>
Sent: Wednesday, July 23, 2003 1:07 PM
Subject: Windows NT 4.0 with IBM JVM Denial of Service


> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
>                                @stake, Inc.
>                              www.atstake.com
> 
>                             Security Advisory
> 
> 
> Advisory Name: Windows NT 4.0 with IBM JVM Denial of Service
>  Release Date: 07/23/2003
>   Application: Any Java application, other applications
>                are possible attack vectors.
>      Platform: Java 2 Runtime Environment, Standard Edition
>                (build 1.3.0), Windows NT 4.0
>      Severity: Denial of service
>        Author: Matthew Miller <mmiller@atstake.com>
>                Jeremy Rauch
> Vendor Status: Microsoft has patch available
> CVE Candidate: CAN-2003-0525
>     Reference: www.atstake.com/research/advisories/2003/a072303-1.txt
> 
> 
> Overview:
> 
> A flaw exists in Windows NT 4.0's file name processing. The flaw can
> cause heap corruption to occur when a long string is passed to the
> file name functions.  This results in the program calling the NT 4.0
> file name processing functions to crash.
> 
> One attack vector identified by @stake is through a Java servlet
> running on the IBM JVM.  This class of problem highlights the Java
> platform's dependance on the correctness of the underlying operating
> system for it's overall security.  Java application developers
> should still bounds check untrusted inputs that are passed to the
> underlying operating system API, such as file handling functions.
> 
> 
> Detailed Description:
> 
> A denial of service condition for IBM's Java 2 Runtime Environment
> can be triggered when passing a long string to the
> java.io.getCanonicalPath() function. Any application which passes
> user supplied data to the getCanonicalPath() function is potentially
> vulnerable.
>  
> When passing a long string to java.io.getCanonicalPath() an access
> violation occurs in the Windows NT 4.0 ntdll.dll.  This access
> violation causes the IBM JVM to core resulting in a Denial of
> Service. This seems to be due to a corruption of the
> heap.
> 
> 
> Vendor Response:
> 
> Microsoft contacted by @stake: 05/14/2003
> Microsoft reproduced and verified: 06/10/2003
> 
> Microsoft has issued a bulletin and a patch.  More information
> is available at:
> 
> http://www.microsoft.com/technet/security/bulletin/MS03-029.asp
> 
> 
> Recommendation:
> 
> Java developers should identify all occurances and perform data
> validation where java.io.getCanonicalPath is used.
> 
> NT 4.0 Administrators running servers which use Java servlets
> should consider installing the Microsoft supplied patch.
> 
> 
> Common Vulnerabilities and Exposures (CVE) Information:
> 
> The Common Vulnerabilities and Exposures (CVE) project has assigned
> the following names to these issues.  These are candidates for
> inclusion in the CVE list (http://cve.mitre.org), which standardizes
> names for security problems.
> 
>   CAN-2003-0525
> 
> 
> @stake Vulnerability Reporting Policy:
> http://www.atstake.com/research/policy/
> 
> @stake Advisory Archive:
> http://www.atstake.com/research/advisories/
> 
> PGP Key:
> http://www.atstake.com/research/pgp_key.asc
> 
> 
> Copyright 2003 @stake, Inc. All rights reserved.
> 
> -----BEGIN PGP SIGNATURE-----
> Version: PGP 8.0
> 
> iQA/AwUBPx74oUe9kNIfAm4yEQKc6wCghclEcANjGkrPRGENJyoDhKxyBcYAnjbi
> UiSnzl1p7SRXf+9j7dbRQ/M4
> =10T3
> -----END PGP SIGNATURE-----
> 
> 


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH