[Sussex] JavaScript is no longer secure: TURN IT OFF NOW!
Jon Fautley
jfautley at redhat.com
Mon Aug 14 10:26:18 UTC 2006
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Steven Dobson wrote:
> Al
>
> On Sun, 2006-08-13 at 23:28 +0100, Al Bennett wrote:
>> Hello from Edinburgh! (Hoots mon, see you Jimmy, you'll have had your tea
>> etc)
>
> Hope you like your new home.
>
>>> This is a proof of concept. It isn't trying to be malicious.
>> Is it just me, or does this proof of concept not prove very much?
> <snip>
>> Or am I missing something?
>
> I think you're missing something.
I'm not so sure he is - Al makes a good point. All you can do with this
code is exploit misconfigured devices. If you allow misconfigured
devices on your network, there are many other avenues of attack.
> Many devices are network configurable these days. It has just be
> released, but there is a bug in some Linksys routers that would allow a
> JavaScript virus to cause a buffer overrun in the router and thus
> compomise your router/firewall.
So *if* you happen to visit a website with the correct JavaScript and
*if* you have a vulnerable Linksys device, then you *may* be exploited.
The code didn't work for me here, either (or if it did, it took a VERY
long time to scan 10 IP addresses - so long, that I navigated away from
the page).
> Anyway do you want someone else's code looking at the data on your LAN.
> I don't know about you but I assumes that anything connected to my LAN
> is trustworthy. I don't trust systems in my DMZ as much, and I
> definitly don't trust anything on the WAN mat all, but my LAN - that I
> trust.
You really need to readdress your security measures then. No network
should ever be considered completely trusted unless you are 100% certain
of what data is being passed by it. You can never do this on a network
connected to the Internet. Rolling your own firewall rules helps a lot,
but it's not perfect.
Remember, most consumer wireless devices/routers/etc are specifically
designed without security in mind - they go for ease of use. "Proper"
wireless access points (3com/Cisco/etc) will not activate the wireless
device until you've logged in and configured the device (more than just
setting a password) - but then, they're not aiming for the world and his
dog who think wireless is 'kinda cool'.
Personally, I don't see any real problem with this JS code. Couple it
with other attacks and you may have a potential to attack large numbers
of people, but realistically, you could only use this as part of a
larger, more targetted attack on specific networks.
Just my 2p...
/j
- --
Jon Fautley RHCE, RHCX <jfautley at redhat.com> direct: +44 1483 739615
Technical Account Manager office: +44 1483 300169
Red Hat UK mobile: +44 7841 558683
10 Alan Turing Road, Surrey Research Park, Guildford, Surrey, GU2 7YF
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org
iD8DBQFE4E+6kRG1dDyibUQRAusRAKCeI8E1UY9BSHljlflV6+pC7hwVdgCcD1Ni
K2gPvOiQosB2jVmesGndUQM=
=OyLb
-----END PGP SIGNATURE-----
More information about the Sussex
mailing list