[
Date Prev][
Date Next][
Thread Prev][
Thread Next][
Date Index][
Thread Index]
Re: [VOTEPRI] 12 high priority candidates as of 5/1/2000
* Steven M. Christey (coley@LINUS.MITRE.ORG) [000502 19:07]:
> Elias Levy and Bill Wall brought up a number of different points
> related to CAN-1999-0031, a Javascript bug. Below is the updated
> voting information for this candidate. It touches on a number of
> issues which I think are important for CVE, so I am emphasizing it
> more than I usually would for a legacy candidate.
>
> - Steve
>
>
> =================================
> Candidate: CAN-1999-0031
> Published:
> Final-Decision:
> Interim-Decision:
> Modified:
> Proposed: 19990728
> Assigned: 19990607
> Category: SF
> Reference: CERT:CA-97.20.javascript
>
> JavaScript allows remote attackers to monitor a user's web
> activities.
>
> INFERRED ACTION: CAN-1999-0031 ACCEPT (3 accept, 1 ack, 0 review)
>
> Current Votes:
> ACCEPT(2) Wall, Cole
> MODIFY(2) Christey, Levy
> NOOP(1) Northcutt
>
> Comments:
> Christey> The CERT advisory is at http://www.cert.org/advisories/CA-97.20.javascript.html
> Christey>
> Christey> ADDREF HP:HPSBUX9707-065
> Christey> http://www.codetalker.com/advisories/vendor/hp/hpsbux9707-065.html
> Christey>
> Christey> According to the CERT advisory, this issue affects Internet
> Christey> Explorer 3.x and 4.x, and Netscape 2.x, 3.x, and 4.x.
> Christey> Include this in the description.
> Levy> Need a better description of the vulnerability there were several JS
> Levy> vulnerabilities in the same time frame that had similar results but
> Levy> were porly documented. This, the Bell Labs vulnerability, was one of them.
> Levy> This is one of the other ones:
> Levy> http://www.securityfocus.com/templates/archive.pike?list=1&msg=c%3dDE%25a%3dDBP%25p%3dSCN%25l%3dMCHH9EEA-970711140700Z-21724@de-mch-he01a.exchange.pn.siemens.de
> Wall> Add Internet Explorer 5 also. See
> Wall> http://www.microsoft.com/technet/security/bulletin/ms99-043.asp which allows
> Wall> JavaScript to read files on other computers.
> Christey> MS:MS99-043 is already handled by CVE-1999-0793. This one is
> Christey> different because IE 3.x and 4.x are affected; for
> Christey> CVE-1999-0793, it affected 4.x and 5.x. Also, this one
> Christey> just allows someone to read cookies, HTML form data, and
> Christey> what URLs were visited. CVE-1999-0793 allows the attacker
> Christey> to read files on the target's computer. Thus this one is
> Christey> different than CVE-1999-0793, and MS:MS99-043 should not be
> Christey> added.
> Christey>
> Christey> The reference that Elias provided describes 2 bugs, neither
> Christey> of which is the "Bell Labs" bug, i.e. this candidate (just to
> Christey> confirm what Elias said; the CERT advisory explicitly thanks
> Christey> Bell Labs). The first bug *sounds* a lot like this candidate, but
> Christey> didn't need Javascript. Refer to this as the "Danish bug"
> Christey> since it was "discovered by a Danish IS consultant company."
> Christey>
> Christey> The second bug describes the same symptoms as CVE-1999-0793.
> Christey> However, this reference only describes the problem for
> Christey> Netscape Nagivator; CVE-1999-0793 only mentions IE.
> Christey> Thus it's possible that the problem was identified and fixed
> Christey> for Netscape, and later "rediscovered" by Microsoft and
> Christey> addressed for Internet Explorer. (The CD:DISCOVERY-DATE content
> Christey> decision, when reviewed by the Board, will dictate what to
> Christey> do in these sorts of cases). But then again, they could be
> Christey> different bugs entirely, but they just happen to have the same
> Christey> symptoms. If the bug is more in the Javascript model than in
> Christey> the implementation, then maybe CD:SF-CODEBASE won't apply.
> Christey> We might be able to roll this second bug in with
> Christey> CVE-1999-0793; thus we may need to REASSESS CVE-1999-0793 in
> Christey> the future.
> Christey>
> Christey> It is possible that this second bug is the same as the
> Christey> "Singapore privacy bug" described here:
> Christey> http://www.securityfocus.com/templates/archive.pike?list=1&date=1997-07-28&msg=Pine.SUN.3.94.970728112219.25473B-100000@dfw.dfw.net
> Christey> http://www.securityfocus.com/templates/archive.pike?list=1&date=1997-07-22&msg=Pine.SUN.3.94.970726193056.27668B-100000@dfw.dfw.net
> Christey>
> Christey> These posts were on July 22 and 28. Singapore is dated after
> Christey> the initial CERT advisory and references LiveConnect, which
> Christey> "enables communication between JavaScript and Java applets."
> Christey> Kuo Chiang, the person referenced in the above posts as the
> Christey> discovered, sent a followup a week later on August 1:
> Christey>
> Christey> http://marc.theaimsgroup.com/?l=bugtraq&m=87602746719458&w=2
> Christey> But this is merely a clarification of the earlier problem, as
> Christey> his post includes a reference to a ZDNet article written
> Christey> on July 25.
> Christey>
> Christey> The poster referred to by Elias, Matthias Dominick, sent a
> Christey> followup to the CERT advisory saying that the Danish bug
> Christey> appeared to be fixed, but the Bell Labs bug wasn't.
> Christey>
> Christey> http://www.securityfocus.com/templates/archive.pike?list=1&date=1997-07-8&msg=c%3dDE%25a%3dDBP%25p%3dSCN%25l%3dMCHH9EEA-970710145437Z-20375@de-mch-he01a.exchange.pn.siemens.de
> Christey>
> Christey> Two legacy candidates will eventually be created to handle
> Christey> these 2 other bugs, i.e. Singapore and Danish.
> Christey>
> Christey> In the meantime, the description for this one can be extended
> Christey> to mention the Bell Labs bug and include pointers back to some
> Christey> of the related posts.
> Christey>
> Christey> If this mess isn't an argument for a naming standard, I don't
> Christey> know what is :-) :-) On a more serious note, this is an
> Christey> indicator of why it may be important for CVE to provide a way
> Christey> of distinguishing between different bugs discovered in the
> Christey> same software at around the same time (CD:SF-LOC will address this,
> Christey> and is one of the first CD's we will discuss when I reintroduce
> Christey> them).
>
>
> >ACCEPT - voter accepts the candidate as proposed
> >NOOP - voter has no opinion on the candidate
> >MODIFY - voter wants to change some MINOR detail (e.g. reference/description)
> >REVIEWING - voter is reviewing/researching the candidate, or needs more info
> >RECAST - candidate must be significantly modified, e.g. split or merged
> >REJECT - candidate is "not a vulnerability", or a duplicate, etc.
>
> VOTE: MODIFY
Add "Bell Labs" to the description or name.
--
Elias Levy
SecurityFocus.com
http://www.securityfocus.com/