[ale] {OT} -- For the programmer on the list
Ron Frazier
atllinuxenthinfo at c3energy.com
Thu Jan 12 20:41:40 EST 2012
On 1/12/2012 8:29 PM, Ron Frazier wrote:
> On 1/12/2012 4:59 PM, Michael Potter wrote:
>
>> On Thu, Jan 12, 2012 at 2:28 PM, Jay Lozier<jslozier at gmail.com> wrote:
>>
>>
>>> On 01/12/2012 01:29 PM, Jim Kinney wrote:
>>>
>>> +1
>>>
>>> Java is both a place and a beverage. It's not a language worthy of
>>> continuity.</snark>
>>>
>>>
>>> <snark>And it is one the major security problems in the Windows world. IMHO
>>> it is about halfway between a scripting language and an industrial strength
>>> language with all the worst features of both and none of the advantages of
>>> either</snark>
>>>
>>>
>>>
>> Jay,
>>
>> Could you elaborate on what major security problems are introduced to
>> Windows because of the presence of Java/JVM?
>>
>> I use the JVM on windows and am interested in what security problems
>> exist in Java/JVM versions in current use on Windows.
>> I am not interested in the history of resolved problems.
>>
>> This is a sincere request for information, not bait for a debate.
>>
>>
>>
> Hi Michael,
>
> I realize you directed your comment to Jay, but I thought I'd throw this
> in. I am not a security expert, but I do listen to some security
> podcasts like Security Now ( http://twit.tv/sn ,
> http://www.grc.com/securitynow.htm ) and other computer related podcasts
> on the TWIT (This Week In Tech, http://twit.tv ) network. These
> frequently provide useful information. They're always talking about
> flaws in Java and security vulnerabilities related to Java. While I
> cannot cite specific examples, I can assure you that it is a risk to any
> machine it's running on that is exposed to the public. You could try
> searching through the transcripts of the show at grc.com . You could
> also do some research at http://www.sans.org/security-resources/ . I
> remember one problem they were discussing where a security researcher
> was able to bypass the same origin policy. As I understand it, if your
> Java app is connected to nytimes.com, then an infected page shouldn't be
> able to load something ugly from hacker.com, etc. They were able to get
> around that somehow. There was a very notable case last year where a
> malicious ad was injected into the automated ad stream at the New York
> Times and several thousand users were infected with a trojan (I think)
> just by visiting the site.
>
> I realize that this sounds a bit shallow without me giving specific
> references. I don't have the time to look them up right now. I will
> say, though, that I've become so convinced that Java is a security risk
> that I've removed it from my Son's computer and my Dad's computer which
> I maintain and another relative's computer which I assist with as
> needed. I'm working on learning Java programming, and I have some Java
> dependent applications, so it has to stay on my machines. Any machine
> which has Java on it must be updated routinely. I try to update the
> following every week, and at least every month, on my machines: OS
> patches, AV software, Firefox, Firefox addons, Java, Adobe Flash, and
> Adobe Reader. This includes Windows and Linux machines. It's kind of my
> weekly ritual on Monday.
>
> There is one genre of vulnerability that Java, or JavaScript, or any
> scripting language that can be in a web page, definitely opens up.
> Unfortunately, I speak from the personal experience of a relative whose
> computer I had to rebuild after it got a virus, twice. That
> vulnerability is social engineering. She somehow encountered a
> malicious web page. Some form of scripting, probably Java or
> JavaScript, allowed the malicious page to create a new popup window with
> an EXTREMELY real looking display that said it was the AV software
> scanning her system, had found some viruses, and click here to remove
> them. To us geeks, that may sound like a common ploy to deploy a virus,
> which it is. But, to an end user who's never seen it before, it is
> quite convincing and scary. In the 5 seconds of indecision, even though
> she's a pretty savvy user, she clicked the button, and that let the
> virus get it's hooks into the system. Modern malware is so
> sophisticated in some cases, that you can never really be sure you've
> gotten rid of it without erasing the hard drive and restoring backup
> data and reinstalling applications. Right after the incident, she
> called me. And, that procedure is exactly what I did to her machine.
> The backups were old, so it was almost like building a system from
> scratch. It took 4 days. I also took the opportunity to upgrade her to
> Vista, which is easier to secure than XP. I've also heard of cases were
> a malicious web page injects a virus without user assistance. On her
> machine, which is now running Vista, I have the User Account Control
> turned up to the max, so it's supposed to tell the user if anything
> requiring high security privileges occurs. She got another virus one
> half a year later and she's pretty sure she didn't click any buttons to
> invite it in. That one immediately hid all her system files, and
> started producing very real looking hard disk sector error messages. It
> had me going for a while and I was ready to replace the hard drive.
> Then, I booted a Linux CD and found that all the files were still
> there. That took me another 3 days to fix, and I still don't know how
> it got in. Again, I'm pretty sure scripting was part of the culprit.
>
> I recommend to anyone who will listen to run Firefox instead of IE, and
> to run the NoScript plugin. This disallows all scripting (including
> Java, JavaScript, Flash, and downloads) from running on a web page
> unless the site is explicitly trusted by the user. This totally
> prevents so called "drive by" attacks. I eat my own dog food, and run
> the plugin myself. Sure, it's a pain when my banking site doesn't
> work. But, I just click a couple of buttons to tell the system to trust
> my bank, and the sites it relies on, then it works. I only have to do
> that once. My relative's computer is still running IE, and can still
> react to JavaScript, so this could happen again. She says she couldn't
> possibly work if she had to approve every site to get it to work. I
> think it wouldn't be as bad as she thinks. I just hope she's really
> careful and keeps routine backups.
>
> Hope this info helps.
>
> PS, there are always "zero day" exploits that nobody in the good guys
> community knows about until they are exploited by the bad guys. Of
> course, there's no way to know which ones of those exist in the current JVM.
>
> Sincerely,
>
> Ron
>
>
>
PS to my other message. I always delete the older version of Java from
my machine when I do an update. That way, malicious code cannot invoke
the older unpatched JVM.
Ron
--
(PS - If you email me and don't get a quick response, you might want to
call on the phone. I get about 300 emails per day from alternate energy
mailing lists and such. I don't always see new messages very quickly.)
Ron Frazier
770-205-9422 (O) Leave a message.
linuxdude AT c3energy.com
More information about the Ale
mailing list