[33560] in Hotline Meeting

home help back first fref pref prev next nref lref last post

RE:berkeley

daemon@ATHENA.MIT.EDU (John J Morey)
Fri May 17 12:34:40 1996

To: hotline@MIT.EDU
Date: Fri, 17 May 1996 12:34:34 EDT
From: John J Morey <jjmorey@MIT.EDU>


------- Forwarded Message

Received: from PACIFIC-CARRIER-ANNEX.MIT.EDU by po8.MIT.EDU (5.61/4.7) id AA17598; Fri, 17 May 96 12:05:57 EDT
Received: from KUMERA.MIT.EDU by MIT.EDU with SMTP
	id AA19793; Fri, 17 May 96 12:05:55 EDT
Received: by kumera.mit.edu (AIX 4.1/UCB 5.64/4.03)
          id AA17342; Fri, 17 May 1996 12:09:18 -0400
From: phnelson@kumera.mit.edu
Message-Id: <9605171609.AA17342@kumera.mit.edu>
To: jjmorey@MIT.EDU
Cc: phnelson@kumera.mit.edu, lynch@bc.edu
Subject: JavaScript Problem on berkeley?
Date: Fri, 17 May 96 12:09:18 -0400

Dear JJ,
	thanks for your email:

>Hi Peter -
>
>I log'd onto one of our test systems and it does take along time
>for netscape to startup, however I don't understand the 2nd part
>of your mssg:

The time it took to load seemed longer than usual. 

The single pixel window was a small window border around a
single pixel. This reminded me of the following email I got
a while ago: the bit in particular is:-

>>    Open 1 pixel window and log all URL accesses

which seemed to me to be exactly what happened, but I was
only accessing my own home page which has no javascript
at all!?! I just checked and it doesn't look like anybody
hacked my page - my best guess is that netscape on berkeley
has been modified in some way - but I could be wrong.

the info on the file is:

2545 Mar 12 09:06 pwhots.html

which indicates that it has not been modified since I put
it there! Also I have not had this problem on any other
machine so I don't think it's a problem with kumera but
I'll get Jaqui to check it out for me.

Please let me know what you find out/do about this problem.
- - Thanks 

Regards,
Peter Nelson

- ------- Forwarded Message

Received: by kumera.mit.edu (AIX 4.1/UCB 5.64/4.03)
          id AA16762; Wed, 13 Mar 1996 10:48:00 -0500
From: phnelson
Message-Id: <9603131548.AA16762@kumera.mit.edu>
To: rutledge@mit.edu, ehwong@mit.edu
Cc: phnelson@kumera.mit.edu
Subject: more on the trouble with java
Date: Wed, 13 Mar 96 10:48:00 -0500


- - ------- Forwarded Message

Received: from cleo.bc.edu by kumera.mit.edu (AIX 4.1/UCB 5.64/4.03)
          id AA16044; Wed, 13 Mar 1996 09:00:49 -0500
Received: from cc30.bc.edu (cc30.bc.edu [136.167.2.151]) by cleo.bc.edu (8.6.13/8.6.12) with SMTP id IAA58587; Wed, 13 Mar 1996 08:57:49 -0500
From: Jaqui Lynch <lynch@bc.edu>
To: sec-sig@admin1.bc.edu
Subject: (COPY) Re: Security Vulnerability in <fwd>
Message-Id: <SIMEON.9603130953.A@cc30.bc.edu.>
Date: Wed, 13 Mar 1996 09:04:53 -0500 (EST)
Priority: NORMAL
X-Mailer: Simeon for Windows
X-Authentication: IMSP
Mime-Version: 1.0
Content-Type: TEXT/PLAIN; CHARSET=US-ASCII

On Wed, 13 Mar 96 08:31:00 EST MAUREEN D TOUHEY 
<TOUHEY@BCVMCMS.BC.EDU> wrote:
>
>
>Copy From: TOUHEY,MAUREEN D <TOUHEY@BCVMCMS.BC.EDU>
>Orig Sent: TUE, 12 MAR 96 18:24 EDT
>Orig From: OWNER-INFSEC-L@ETSUADMN.ETSU.EDU
>Subject:   Re: Security Vulnerability in
>
>Received:from VMS.DC.LSOFT.COM by BCVMCMS.BC.EDU (IBM MVS 
SMTPV3R1)withTCP;
>   Tue, 12 Mar 96 18:20:59 EST
>Received:from PEACH.EASE.LSOFT.COM (205.186.43.4)by 
VMS.DC.LSOFT.COM (LSMTP
> for OpenVMS v1.0a) with SMTP id 3EDA8C80 ; Tue, 12 Mar 1996 
18:21:50 -0500
>Date:         Tue, 12 Mar 1996 19:14:03 -0500
>Reply-To:     Information Security List 
<INFSEC-L@ETSUADMN.BITNET>
>Sender:       Information Security List <INFSEC-L@ETSUADMN.BITNET>
>From:         Vin McLellan <vin@SHORE.NET>
>Subject:      Re: Security Vulnerability in Netscape 2.0 (fwd)
>X-To:         Information Security List
>              <INFSEC-L%ETSUADMN.BITNET@UICVM.CC.UIC.EDU>
>To:         Multiple recipients of list INFSEC-L 
<INFSEC-L@ETSUADMN.BITNET>
>
>>The most recent version of the Netscape web browser,Netscape 
Navigator 2.0
>>has several new features and improvements over the previous 
versions.
>>Unfortunately, it has been discovered that one of those new features,
>>JavaScript, has introduced a serious security problem.
>>
>>The following problems have been identified.
>>
>>    Forge e-mail/steal e-mail address
>>    Recursively list local disks
>>    Open 1 pixel window and log all URL accesses
>>
>
>Attached is a similar alert -- reportedly forwarded from a Lotus internal
>net -- which was yesterday distributed in the mailing list of the Digital
>Commerce Society of Boston.
>        _vbm
>
>--------------------------
>
>Please be aware that potential security exposure has been identified 
in
>JavaScript and you should take appropriate precautions.
>
>Subject: Security Advisory
>
>We have identified a serious security exposure in Web Browsers that 
support
>JavaScript. The current implementation of JavaScript allow intruders
>unprecedented access to contents of client computers.
>
>In brief, JavaScript is a language used to build small "applets" that are
>interpreted and executed by Web browsers on client computers. An 
increasing
>number of Internet websites are building web 
pageswithJavaScript.JavaScript
>applets can be programmed to access anything on the client computer 
or the
>network file system it is attached to.Access can include forwarding 
offiles
>to external sites, and potentially may include erasing files from client
>computer and network file servers. These actions are typically 
performed
>without the client computer user's awareness.
>
>The exposure affects all client platforms that have JavaScript enabled
>browsers. Platforms include UNIX, AIX, Windows, and OS/2 running 
Windows
>versions of browsers. Web browsers supporting JavaScript include all 
2.x
>versions and Beta versions of Netscape Navigator. Remote users 
connecting
>through dial-in gateways,LAN connected users,and users 
accessingtheInternet
>through security firewalls are all at risk.
>
>Java and JavaScript are distinctly different programming languages. 
Java
>language is considered to be relatively secure.JavaScript 
isthelanguagewith
>the security risk. Some browsers include an option to disable 
Java.However,
>using the option to disable Java does not disable JavaScript.
>
>There are no known ways to disable JavaScript in browsers that 
support it.
>
>We will keep you informed of any resolution or 
workaroundstothisexposure.At
>this point,we see no alternative other than to ask you 
todirectallemployees
>in your units NOT to use any Web browser that supports JavaScript.
>
>
>         Vin McLellan +The Privacy Guild+ <vin@shore.net>
>      53 Nichols St., Chelsea, Ma. 02150 USA Tel: (617) 884-5548
>                         <*><*><*><*><*><*><*><*><*>
>ALSO:      LYNCH,JAQUELINE A <LYNCH@CLEO.BC.EDU> (COPIED BY 
TOUHEY)



Jaqui A. Lynch
Manager Systems Services
Information Technology
Boston College
lynch@bc.edu



- - ------- End of Forwarded Message


- ------- End of Forwarded Message


------- End of Forwarded Message


home help back first fref pref prev next nref lref last post