[16389] in bugtraq

home help back first fref pref prev next nref lref last post

Re: BrownOrifice can break firewalls!

daemon@ATHENA.MIT.EDU (TAKAGI, Hiromitsu)
Fri Aug 25 15:01:24 2000

Mime-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: 7bit
Message-Id:  <20000824094211.36BF.TAKAGI@etl.go.jp>
Date:         Thu, 24 Aug 2000 09:53:52 +0900
Reply-To: "TAKAGI, Hiromitsu" <takagi@ETL.GO.JP>
From: "TAKAGI, Hiromitsu" <takagi@ETL.GO.JP>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <39946319340.6D7ETAKAGI@java-house.etl.go.jp>

On Sat, 12 Aug 2000 05:33:29 +0900
"TAKAGI, Hiromitsu" <takagi@ETL.GO.JP> wrote:
> On Thu, 10 Aug 2000 09:04:32 +0200
> "Greulich, Andreas" <Andreas.Greulich@ISB.ADMIN.CH> wrote:
> > I am quite surprised about the low echo the newest bug in Netscapes Java
> > library (see http://www.brumleve.com/BrownOrifice/) receives. I am quite
> > worried about it because I think its impact is much higher than the
> > "WWW-server-applet" you find on above page.
>
> This can be verified by trying the following refined proof of concept
> Applet.
> http://java-house.etl.go.jp/~takagi/java/test/Brumleve-BrownOrifice-modified-netscape.net.URLConnection/Test.html

I have confirmed that "about:global" url also can be used to exploit.
This makes the problem more serious.


Regards,
--
Hiromitsu Takagi
Electrotechnical Laboratory
http://www.etl.go.jp/~takagi/

home help back first fref pref prev next nref lref last post