[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [escepticos] the Big Brother



Jose M. Bello Dieguez wrote:

> Mig, acabo de probarlo y me he quedado de piedra. Asombroso. ¿Qu´e dicen los
> informáticos de la lista?
> 
> Saludos,
> 
> JM

Si tu vas a la pagina y accesas los comentarios de la midia, pues te
asustas aun mas, y las fechas son bastante recientes, del orden de
cuatro o cinco dias atras solamente. Coloco aqui solo el comentario de
Wired News:

                  Browser Privacy Fix Fails
                  by Chris Oakes 

                  10:35 a.m.  7.Oct.98.PDT
                  The man who discovered a vulnerability in
                  Netscape's Navigator browser wasted no
                  time in finding a similar problem in the latest
                  version of Navigator released Monday. 

                  Dan Brumleve, a software consultant, found
                  the original security hole in Navigator that
                  lets would-be intruders detect a list of Web
                  sites recently visited by an individual. Even
                  though the new version, Communicator
                  4.07, includes fixes for the original flaw,
                  Brumleve said Tuesday that they don't work.

                  "The new hole has the effect of
                  circumventing the read-protection
                  mechanism [employed by Netscape's
                  updated software] in a more general way,
                  allowing any document to insert JavaScript
                  code into another document's context," he
                  explained in an email. 

                  The ability to insert rogue JavaScript
                  instructions into a Web page still leaves
                  browsing information and other sensitive
                  data exposed, he said. Brumleve has written
                  test scripts enabling him to pilfer a user's file
                  directory and "cookies," which often contain
                  private information. 

                  Cookies are chunks of data used by some
                  Web sites to identify the browser, and the
                  user, visiting the site. In the wrong hands, an
                  intruder could visit a Web site using
                  someone else's identity. 

                  Netscape confirmed the hole in its new
                  software. 

                  "We've confirmed that, in fact, it is another
                  privacy bug," said product manager Eric
                  Byunn. "We'll be posting a notice to our Web
                  site about it, as we did on the other one."
                  Byunn said that Netscape will issue a
                  software fix as soon as possible. 

                  As with his earlier finding, dubbed
                  Cache-Cow, Brumleve posted his new
                  findings -- appropriately named Son of
                  Cache-Cow -- with demonstration scripts on
                  his own Web site as a warning. 

                  "Finding the Cache-Cow hole was a freak
                  accident of observation, and zeroing in on
                  this new hole only took a few hours of
                  research," he said. "There are probably
                  dozens of other problems like this that
                  nobody has found yet." 

                  The recurrence of privacy-oriented
                  vulnerabilities are a worrisome sign to some
                  experts that browser companies need to
                  rethink their approach, rather than simply
                  reacting to holes as they're discovered. 

                  "The fact that there are so many little leaks
                  like this is kind of disturbing," said Richard
                  Smith of Phar Lap Software. "I sent a list of
                  19 problems to Netscape and Microsoft in
                  these areas back in August. Their response
                  was that there was no way to get JavaScript
                  to access this stuff." 

                  Smith ran his own tests and confirmed at
                  least one of Brumleve's newly discovered
                  exploits. He made his own discoveries of
                  vulnerabilities in the Eudora email program
                  last summer. 

                  When the original problem surfaced,
                  Netscape said it would be investigating all
                  aspects of JavaScript to prevent similar
                  situations in the future. But despite the quick
                  discovery of a similar exploit, Byunn doesn't
                  consider the problem systematic. 

                  "This really is a new bug," he said. "It's
                  entirely separate from the previous bug in
                  the way the attack is made under the
                  covers. We really just feel it's more of a
                  coincidence and the fact that there's a smart
                  guy who's working hard to find privacy bugs
                  or vulnerabilities in our products." The
                  company is glad to get the feedback on its
                  software, Byunn said. 

                  But Smith thinks the browser companies
                  need to step back and take a bigger look at
                  interaction between different software
                  components like JavaScript and applications
                  like browsers. What Brumleve is dramatically
                  demonstrating, Smith said, are the
                  impressive capabilities that come from
                  combining browser actions with scripting
                  languages like JavaScript. 

                  "I don't think [any browser company] can
                  give you a [definitive] answer as to whether
                  there's a security hole or not.... They've got
                  to understand how products fit together
                  here. It's almost like Lego. We have the
                  danger that people don't realize that we can
                  put things together to figure out scary
                  security problems." 

                  As more companies use the Web to run
                  critical business applications, security holes
                  may represent lucrative opportunities for
                  electronic intruders. 

                  For example, Smith noted that Microsoft has
                  established a convention that causes its
                  personal finance software, Microsoft Money,
                  to launch automatically. Just like a browser,
                  which can be automatically started with
                  "http://"; text in an email message or script,
                  Microsoft Money can be launched using
                  "money://," Smith said. 

                  Therefore, Smith concluded, it's possible to
                  imagine a scenario where a person's
                  financial software could be induced to make
                  an electronic payment to a site, and not
                  necessarily the right one. 

                  In Smith's opinion, "there should be no way
                  that an email message can start up
                  Microsoft Money. That's the complexity issue
                  we get into here." 

                  Smith said Brumleve's exploits could also be
                  carried out via JavaScript included in email
                  messages. By sending a message carrying
                  a rogue script, the Netscape browser could
                  be made to launch and carry out the
                  misdeed. 

                  Brumleve says the latest exploit affects all
                  versions of Netscape's browser that support
                  JavaScript, including the new one. He has
                  not tested the exploits on Microsoft's Internet
                  Explorer software, mainly because he does
                  not regularly use it, he said. 

                  Microsoft representatives could not be
                  reached for comment.