Forwarded from FMS:

SomeDude at NuBL7aaJ6Cn4fB7GXFb9Zfi8w1FhPyW3oKgU9TweZMw wrote :
> djk at isFiaD04zgAgnrEC5XJt1i4IE7AkNPqhBG5bONi6Yks wrote:
>> cwlrao41 at f2qqcdkajvdGGdtRf33S6GfW2dYFMfc4sR6BVPg8vPQ wrote:
>>
>>> SomeDude at NuBL7aaJ6Cn4fB7GXFb9Zfi8w1FhPyW3oKgU9TweZMw wrote :
>>>> cwlrao41 at f2qqcdkajvdGGdtRf33S6GfW2dYFMfc4sR6BVPg8vPQ wrote:
>>>>> Is FMS possibly affected by recent XML vulnerability? Does it do XML
>>>>> parsing itself or using some library (maybe statically linked)?
>>>> FMS uses libPoco for XML parsing.  What vulnerabilities are you
>>>> referring to?
>>>>
>>
http://tech.slashdot.org/story/09/08/05/1555219/XML-Library-Flaw-mdash-Sun-Apach
>>> e-GNOME-Affected
>>> http://www.cert.fi/en/reports/2009/vulnerability2009085.html
>> Woah!
>> "Vendor Information
>> Python libexpat
>> Apache Xerces, all versions
>> Sun JDK and JRE 6 Update 14 and earlier
>> Sun JDK and JRE 5.0 Update 19 and earlier
>> "
>> Does this really mean that Java code running on these jvms is vulnerable
to
>> remote code execution?
>>
>> Does this impact fred? (kind of doubt it)
>>
>
*> I have done some testing with the type of vulnerability they are talking
> about here.  While this particular vulnerability is about DoS and remote
> code execution, the same type of vulnerability can be used to open a
> connection to any computer, and doesn't seem to be limited to the Java
> versions listed above.  What I found with my testing wasn't very
> encouraging.
>
> Let me first say that I am using Sun JDK Update 15.  I tested 3 Freenet
> apps, jSite (0.7.1), Thaw (0.7.10), and Frost (2009-03-14), to see if
> they are vulnerable specifically to the remote connection type of
> exploit.  I had the exploit code connect to a web server on another
> machine and I watched the web log for connections.
>
> I added the exploit code to the jSite config file, started it up, and
> sure enough the exploit code caused a connection to the remote machine.
>   Now jSite doesn't do any uploading and downloading of XML files from
> other users, so it's not an immediate threat, but the exploit ability
> remains there.
>
> With Thaw, I exported an index, added the exploit code to it, and
> reimported it.  The code was triggered again, and a connection was made
> to the remote machine.  This is very serious, as a malicious user could
> add the exploit code to an index and have it executed when another Thaw
> user downloads and parses that index.
>
> In Frost I exported the identity xml file and added the exploit code to
> it.  When I imported the file, the code was not executed.  I tried
> several different variations of the exploit code, but was unable to get
> Frost to run it.  I'm not sure if Frost is using a different XML parser
> than jSite and Thaw, but no matter what I did, I could not get the
> exploit code to run.  That's not to say it can't be exploited, just that
> I couldn't find a way to run this particular exploit.
>
> As I mentioned in another message, the XML parser in the Poco library,
> which FMS uses, doesn't seem to parse this type of exploit by default
> either.
>
> It appears that there are XML parsers that are vulnerable and some that
> are not, and due to the nature of this exploit, it would be best to wait
> to hear from the developer of any Freenet applications you use to
> confirm that the exploit doesn't affect them before you run their
> application.  This exploit is extremely threatening if you value your
> anonymity.
*
-------------- next part --------------
An HTML attachment was scrubbed...
URL: 
<https://emu.freenetproject.org/pipermail/tech/attachments/20090808/5322df2a/attachment.html>

Reply via email to