Edited by aad, 17 March 2005 - 01:45 AM.

Theory
#61
Posted 17 March 2005 - 01:19 AM
Register to Remove
#62
Posted 17 March 2005 - 09:41 AM
To wit: You MUST click YES to continue.
To wit, no one has EVER claimed otherwise! Just for the record however, you can ALSO click ALWAYS. So, two out of three buttons on a vague (to an uninformed user) dialog allow the applet to download and run an arbitrary Windows executable.
Here are my issues with the current Firefox/SunJava approach to applet security:
1) If their security approach must entail popping up a dialog, at least have it give a clear indication of what permissions an applet requires. "Trust" is too vague, too broad, and too uninformative a euphemism for making a rational decision. In fact, so is "all" (which you see in other browsers). List them explicitly. Perhaps one is willing to allow it to read but not write a particular file, or write but not execute it. Please give us finer grained information, and control.
2) Treat signed and unsigned applets with equal contempt. Try this applet on Sun's site. It crashes immediately with no dialog whatsoever (which, in my opinion is a good thing). We are not subjected to a dialog box in this case, apparently because the offending applet is unsigned. Moreover, as we have seen, anybody can get a signing certificate. So, why give a phisher with a certificate an opportunity to perform social engineering?
3) It all boils down to the lack of an ACL or whitelist, and the lack of a global (to Firefox) option to disable certain Java permissions. Either of these would be preferable to disabling Java completely.
Finally, to see how annoying these "beg for trust" dialogs can potentially become, try browsing for a day with IE, with its security permissions for ActiveX, Scripting, .Net Framework, and Custom Java all set to "prompt". At up to a half dozen dialogs per page or refresh, I doubt you'll make it a whole day.
Thanks again, Efwis and Coyote, for bringing this handy social engineering enabling mechanism to light. Adios amigos.
#63
Posted 17 March 2005 - 10:21 AM
#64
Posted 17 March 2005 - 03:28 PM
2. It's a good thing this exploit came to light regardless of who found what and the differing opinions because something will now be done about it. However, much credit is due Efwis and Coyote for initial discovery and hot pursuit.
This is not an exploit! It presents a perfectly clear warning window. An exploit (which this clearly is not the case) would not present a dialog such as this, it would rather infect your computer maliciously without warning.
The image below shows just how obvious it is.

Do a search for "Integrated Search Technologies." This is the second link in google. That alone should raise some eye-brows.
"Authenticity can not be verified". You should realize that this may not be something you want to have installed onto your machine.
"Not Trusted" Exploits are NOT this user friendly.
"Has Expired" + "is not yet valid". This is a human stupidity error if they click yes.
Note the three yellow exclamation marks that just SCREAM danger.
If a user clicks yes, it is his or her own fault for being so blind to do so.
As I may quote a slashdot user: "What more does Sun Java need to do? Have hobgoblins attack you and bop you on the head with a mallet if you click yes?"
There is no possible way this is an exploit. It is doing what it is coded to do, it presents the user with a choice Yes or No, it doesent secretly install to your PC without warning.

#65
Posted 17 March 2005 - 03:57 PM
2. It's a good thing this exploit came to light regardless of who found what and the differing opinions because something will now be done about it. However, much credit is due Efwis and Coyote for initial discovery and hot pursuit.
This is not an exploit! It presents a perfectly clear warning window. An exploit (which this clearly is not the case) would not present a dialog such as this, it would rather infect your computer maliciously without warning.
The image below shows just how obvious it is.
Do a search for "Integrated Search Technologies." This is the second link in google. That alone should raise some eye-brows.
"Authenticity can not be verified". You should realize that this may not be something you want to have installed onto your machine.
"Not Trusted" Exploits are NOT this user friendly.
"Has Expired" + "is not yet valid". This is a human stupidity error if they click yes.
Note the three yellow exclamation marks that just SCREAM danger.
If a user clicks yes, it is his or her own fault for being so blind to do so.
As I may quote a slashdot user: "What more does Sun Java need to do? Have hobgoblins attack you and bop you on the head with a mallet if you click yes?"
There is no possible way this is an exploit. It is doing what it is coded to do, it presents the user with a choice Yes or No, it doesent secretly install to your PC without warning.
I gave SunJava permission while running Linux based Mozilla FireFox, "nothing" whatsoever happened and nothing will cause there is no MicroSoft explorer to infect. Whether it is an exploit or not it's execution is rendered useless in a Linux Environment. Yeah, so if you don't know what you are doing best to use Linux Mozilla Firfox. Then, you can blindly run and give Sun Java permission on such warnings and nothing will happen. In fact, I encourage you to do so just for laughs. Prove me wrong and show me that this works in Linux.
Edited by aad, 17 March 2005 - 04:01 PM.
#66
Posted 17 March 2005 - 04:07 PM

#67
Posted 17 March 2005 - 06:28 PM
#68
Posted 17 March 2005 - 06:52 PM
I kept myself away from this subject because, to be quite frank, I didn't feel I was informed enough. After seeing some of the side effects this "exploit" has had, I looked closer at it. This topic is a quite representative of today's general feel in most forums. On the one hand you have some excellent posts, that do their best to explain and extricate the most information they can on a subject and on the other hand, you have some general bickering on the words used by various posters....
The purpose of this discussion was to raise awareness of the so highly exploitable nature of the Windows Operating System. I think this was done here, and quite nicely too. IE being the cause of a lot of the trouble, but the main problem is with the way MS has rooted everything so deeply in the OS. IE is part of it, you can't remove it....without serious side effects.
So I too feel that thanks need to go out to all involved parties (Efwis, Coyote, Paperghost and Mike for his view on it too and for getting the word out).

'The world is changed; I can feel it in the water, I can feel it in the earth, I can smell it in the air.'
#69
Posted 17 March 2005 - 07:00 PM
LOL Well, you will all be relieved for this is my final post on the subject. I'm not about to begin arguing with anybody, much less with Admins who call their own users "idiots"-- I mean, who normally visits this sort of forum except for those people who mistakenly, or due to some foible, click on the wrong button once in a blue moon. Please don't tell me that all of these folks were infected solely through purely automatic remote exploits. By your own logic, Firefox could safely support ActiveX by simply popping a yes or no dialog at every encounter. Why not just allow embedded binaries in web pages? A mere dialog for protection will suffice will it not? Or why bother whitelisting XPI installs? Apparently, you think Firefox is so secure with SunJava enabled, and, in your opinion "CLEAR" dialogs popping up everytime you visit a signed Java applet containing website, and this is not an annoyance to you, and you do not wish to have more control/info regarding those applets because it would be too inconvenient for the programmers to provide this functionality to mere "idiot" users. What an attitude for an admin of a support site! Bid you all farewell, and leave you some things to consider.
http://plugindoc.moz.../faqs/java.html
"On Windows, Mozilla can be used with Sun's Java Runtime Environment (JRE). It can not be used with the Microsoft Java VM"
https://bugzilla.moz...g.cgi?id=261031
"Additional Comment #3 From Doron Rosenberg (IBM) 2004-09-22 18:19 PST [reply] -------
I wouldn't call this a 1.0 blocker since disabling java is a advanced user thing."
https://bugzilla.moz...g.cgi?id=251793
https://bugzilla.moz...g.cgi?id=239223
https://bugzilla.moz...g.cgi?id=272452
https://bugzilla.moz...ug.cgi?id=98365
https://bugzilla.moz...g.cgi?id=264740
https://bugzilla.moz...g.cgi?id=266155
https://bugzilla.moz...g.cgi?id=266705
https://bugzilla.moz...g.cgi?id=266827
https://bugzilla.moz...g.cgi?id=271098
https://bugzilla.moz...g.cgi?id=271444
http://forum.java.su...601130&tstart=0
http://forum.java.su...threadID=524815
http://sunsolve.sun....ey=1-26-57708-1
http://sunsolve.sun....ey=1-26-57613-1
http://sunsolve.sun....ey=1-26-57591-1
http://sunsolve.sun....ey=1-26-57221-1
#70
Posted 17 March 2005 - 07:08 PM
"A mere dialog for protection will suffice will it not?"
If it gives out enough information, giving a yes or no -- then yes it most likly will. If CWS et al presented a warning "Can we install blah blah blah YES/NO" rather then using exploits the internet would be a better place.
if you're telling me a dialog that displays a YES/NO option with a more details button that provides as much info as the one I posted above does is not good enough, your standards are too high.

Register to Remove
#71
Guest_Paperghost_*
Posted 18 March 2005 - 12:28 AM
Then as Rob said, perhaps you shouldn't be an admin of a support forum where a large percentage of your users end up doing just that.
This is getting rather vapid and sliding deeper into childishness, depsite Rob's best efforts. I'm going to rather lazily cut and paste something i posted over at castlecops.
Some of it is a regurgitation of what Rob said (because his initial points seemed to be missed entirely), some of it is mine. I will add that the exploit WOULD work on Linux. The reason "nothing happened" (as one user put it) is because A win32 executable is not going to run on Linux. And with that in mind...
Fact: The title of the article implicated FireFox only.
Realistically, i couldnt call the title "firefox/opera/netscape/netcaptor/everything else spyware infects IE" - thats rather a mouthful.
Plus, seeing as the initial "discovery" of this was done whilst using firefox and seeing as thats the browser i used to run the test, it seemed perfectly valid to call it that. Also - the title simply poses a question. The article is the answer, which clearly indicates it is both a java issue AND a mozilla issue. In addition, something people seem to be ignoring is the fact that Mozilla's security team have now taken this on and opened a dialogue with Sun. So they have classed this as a browser issue for them to fix.
Once a browser vendor has said its a browser issue, then its a browser issue - end of story. Our opinion of what it is or isnt doesnt really mean much after that. Seeing as how Mozilla security team actually got involved in this, it would have been rather odd to then slant the article towards Opera / Netscape / someone else.
Fact: The "exploit" can be carried out on any browser that supports Sun Java Runtime (including IE presumably, though that one wasn't tested!)
Not true. There have been well documented difficulties getting this to work on Opera for various reasons depending on browser and java version. Also, the install is "intelligent" - it detects what browser you are using and then launches the appropriate install method. If youre using IE, you get an active x prompt. If youre using Firefox you will get the applet.
The Lyricspy site has a JavaScript launcher which decides installation method. That installation method is this:
(IE) use the activeX installer
(Netscape/Mozilla) use the Java installer
Ed Bott: There is nothing that prevents IE from running this as well. That's not news. But there is nothing that prevents Firefox from running this, and that IS news.
The fact that it works on other browsers is irrelevant - if youre specifically talking about Firefox, you have to admit that it works.
More and more security journalists / researchers / vendors are now actually stating publically that this was designed specifically for Firefox (even though it works on other similar browsers). For now, the clearest and easiest to follow explanation is below:
http://www.edbott.co...ves/000568.html
is Ed Botts reaction to the newsletter.
http://www.edbott.co...ves/000562.html
Where he leads you through the (different) IE install.
Fact: A user must click to "approve" the exploit.
And how many spyware installs are caused by just that? Its not good enough to simply say the "stupid end user gets what they deserve" when they click "yes" to an applet, even an untrusted / unsigned one.
The applet itself downloads a native executable binary (PE file) into the Windows temp directory where it then executes. Nowhere in the applet does it say anything about doing that - and the average user would not worry much about such a warning, because they have the (incorrect) notion that Java applets only operate inside a sandbox. With this install, the sandbox doesn't even come into it. The install is done by the PE file that the Java applet downloads and runs - the applet is just a gateway.
Add to that the fact that many average users using firefox will be under the misguided notion that theyre "safe" because theres no active x and xpis are "secured" and its quite right to assume this would catch more people out than a regular, bog standard popup appearing whilst using IE.
After all, you're "using the browser you can trust", right?
I like firefox as much as the next guy, but the simple fact is, this exploit works on Firefox, and now Mozilla are looking into it.
Finally - you may be interested to know that Lockergnome ran a piece on the newsletter. The url is
here.
Edited by Paperghost, 18 March 2005 - 12:29 AM.
#72
Posted 18 March 2005 - 01:24 AM
Edited by Zero, 18 March 2005 - 01:28 AM.

#73
Guest_Paperghost_*
Posted 18 March 2005 - 01:40 AM
"Nowhere in the applet does it say anything about doing that"
dont misquote. nowhere does it state that anything other than a java applet is asking for permission. what is lurking behind the yes / no facade isnt clear enough. in other words, one Java Runtime.exec() plus one browser that doesnt have some sort of whitelist for the applets equals one great big, fat juicy exploit. And i quote:
Firefox is creating a platform that enables extensions and plug-ins to connect directly to the browser. You can't do that and then say, when an extension or plug-in behaves badly, "Hey, not our fault!"
Now for the rest..
"You insist on calling it an exploit when it clearly is NOT. if the user has that much information and is given a choice YES or NO its simply not an exploit."
Your insistence on saying this "isnt" an exploit is rather odd - you are basically saying that the whole history of social engineering / phreaking / phishing / confidence tricking cannot contain the word "exploit".
Im sure Kevin Mitnick would disagree with you on that one.
And for info, the biggest piece of "computer fraud" as listed in the guiness book of records was a piece of social engineering where the "Hacker" didnt actually touch a single computer and got the money as a result of a yes / no interaction with another human.
Exploit? Very much so.
"No. if you read slashdot or any other news site, you'll see thats simply not true".
Theres more to life than slashdot, kid.
Finally -
"This is getting rather vapid and sliding deeper into childishness, despite Rob's best efforts."
So why beat a dead horse -- Mike aint apologising.
I wasn't talking about Mike - as an Admin of ASAP you should be aware that subject is now being resolved away from the public eye so please comply with Maddoktors wishes and stop discussing it on ASAP sites - I was talking about your refusal to aknowledge any of the valid points that you keep brushing aside because they dont "fit" with your idea of what security appears to be. I like firefox. i use firefox. however - the exploit works in firefox.
it also works in other browsers - but if youre specifically talking about the firefox browser (which i am) then the bottom line is -
The install works.
#74
Posted 18 March 2005 - 01:51 AM
Im sure Kevin Mitnick would disagree with you on that one."
Kevin Mitnick would disagree? Sorry but me and some fellow IRCrs had a good laugh with that. I know what a hacker is, Ive read Richard Stallman head to toe. http://www.stallman....on-hacking.html Im not a fool with 'hacking'. I know about social engineering. I own Kevins 'Art of Deception', I've read about bank scams etc but that has little to do with the topic at hand.
"Theres more to life than slashdot, kid."
Funny you should say that. I suppose you don’t know how slashdot works. Let me elaborate. Users from around the world submit stories to slashdot linking to various news sites such as cnn (which is a very big news source fyi), news.com.com, zdnet, tomshardware, among other valuable news sites. It’s a collaboration of people from around the world. This is how I get new from many different sources, a very well put together site for 'news for nerds', kid.
Finally --
Its not an exploit, it never was an exploit, it may be an exploit in the future if they rid themselves of the applet, btu for now it remain not an exploit. Of course the install does work, if the user clicks yes, this makes it a collaboration of the user and the java applet, thus -> not an exploit.
EDIT: I see you never remarked on how some internet users can be idiotic. Do you agree or ignore it?
Edited by Zero, 18 March 2005 - 01:55 AM.

#75
Posted 18 March 2005 - 07:28 AM
Its not an exploit, it never was an exploit, it may be an exploit in the future if they rid themselves of the applet, btu for now it remain not an exploit.
I'm not wanting to get into any kind of discussion on this however I am curious as to what you define an exploit as?
exploit:Pronunciation: ik-'sploit, 'ek-"
Function: transitive verb
1 : to make productive use of : UTILIZE <exploiting your talents> <exploit your opponent's weakness>
2 : to make use of meanly or unjustly for one's own advantage <exploiting migrant farm workers>
- ex·ploit·able /-'sploi-t&-b&l/ adjective
- ex·ploit·er noun
definition supplied by Merriam-Webster Dictionary
As you can see I highlighted the key entry for this definition. it does not say anything about it needing to be authorized by the exploited person or not. Therefore, the conclusion is that this is an exploit IMHO.

helpful links
Hijack This!
Spybot: Search & Destroy
CWShredder
So How did I get infected in the first place?
0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users