----- Original Message -----
From: "@stake Advisories" <advisories@atstake.com>
To: <bugtraq@securityfocus.com>
Sent: Wednesday, July 23, 2003 1:07 PM
Subject: Windows NT 4.0 with IBM JVM Denial of Service
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> @stake, Inc.
> www.atstake.com
>
> Security Advisory
>
>
> Advisory Name: Windows NT 4.0 with IBM JVM Denial of Service
> Release Date: 07/23/2003
> Application: Any Java application, other applications
> are possible attack vectors.
> Platform: Java 2 Runtime Environment, Standard Edition
> (build 1.3.0), Windows NT 4.0
> Severity: Denial of service
> Author: Matthew Miller <mmiller@atstake.com>
> Jeremy Rauch
> Vendor Status: Microsoft has patch available
> CVE Candidate: CAN-2003-0525
> Reference: www.atstake.com/research/advisories/2003/a072303-1.txt
>
>
> Overview:
>
> A flaw exists in Windows NT 4.0's file name processing. The flaw can
> cause heap corruption to occur when a long string is passed to the
> file name functions. This results in the program calling the NT 4.0
> file name processing functions to crash.
>
> One attack vector identified by @stake is through a Java servlet
> running on the IBM JVM. This class of problem highlights the Java
> platform's dependance on the correctness of the underlying operating
> system for it's overall security. Java application developers
> should still bounds check untrusted inputs that are passed to the
> underlying operating system API, such as file handling functions.
>
>
> Detailed Description:
>
> A denial of service condition for IBM's Java 2 Runtime Environment
> can be triggered when passing a long string to the
> java.io.getCanonicalPath() function. Any application which passes
> user supplied data to the getCanonicalPath() function is potentially
> vulnerable.
>
> When passing a long string to java.io.getCanonicalPath() an access
> violation occurs in the Windows NT 4.0 ntdll.dll. This access
> violation causes the IBM JVM to core resulting in a Denial of
> Service. This seems to be due to a corruption of the
> heap.
>
>
> Vendor Response:
>
> Microsoft contacted by @stake: 05/14/2003
> Microsoft reproduced and verified: 06/10/2003
>
> Microsoft has issued a bulletin and a patch. More information
> is available at:
>
> http://www.microsoft.com/technet/security/bulletin/MS03-029.asp
>
>
> Recommendation:
>
> Java developers should identify all occurances and perform data
> validation where java.io.getCanonicalPath is used.
>
> NT 4.0 Administrators running servers which use Java servlets
> should consider installing the Microsoft supplied patch.
>
>
> Common Vulnerabilities and Exposures (CVE) Information:
>
> The Common Vulnerabilities and Exposures (CVE) project has assigned
> the following names to these issues. These are candidates for
> inclusion in the CVE list (http://cve.mitre.org), which standardizes
> names for security problems.
>
> CAN-2003-0525
>
>
> @stake Vulnerability Reporting Policy:
> http://www.atstake.com/research/policy/
>
> @stake Advisory Archive:
> http://www.atstake.com/research/advisories/
>
> PGP Key:
> http://www.atstake.com/research/pgp_key.asc
>
>
> Copyright 2003 @stake, Inc. All rights reserved.
>
> -----BEGIN PGP SIGNATURE-----
> Version: PGP 8.0
>
> iQA/AwUBPx74oUe9kNIfAm4yEQKc6wCghclEcANjGkrPRGENJyoDhKxyBcYAnjbi
> UiSnzl1p7SRXf+9j7dbRQ/M4
> =10T3
> -----END PGP SIGNATURE-----
>
>
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH