Closed
Bug 27009
Opened 25 years ago
Closed 24 years ago
jar: protocol leaves files on hard disk with predictable name
Categories
(Core :: Security, defect, P2)
Tracking
()
VERIFIED
FIXED
M18
People
(Reporter: norrisboyd, Assigned: security-bugs)
References
()
Details
Opening a jar file from http has the side effect of downloading the file to the
user's hard drive in a predictable location. This could be the beginning of a
number of attacks that use presence on the hard drive as an indication of a more
privileged source. (Java comes to mind, since the jar can contain class files.)
Performing an MD5 hash to produce a practically unguessable portion of the path
should fix this problem.
Reporter | ||
Updated•25 years ago
|
Group: netscapeconfidential?
Status: NEW → ASSIGNED
Target Milestone: M16
Reporter | ||
Comment 1•25 years ago
|
||
Reassign to mstoltz.
Assignee: norris → mstoltz
Status: ASSIGNED → NEW
Bulk moving all Browser Security bugs to new Security: General component. The
previous Security component for Browser will be deleted.
Component: Security → Security: General
Assignee | ||
Comment 3•25 years ago
|
||
Hopefully this will be solved if/when we begin to use the network cache stream-
as-file service. If we don't get to that soon, I'll solve this separately.
Status: NEW → ASSIGNED
Is this different behavior from what we had in 4.x? Putting on [nsbeta-] radar.
Please let PDT know if you disagree,
Whiteboard: [nsbeta-]
Changing [nsbeta-] to read [nsbeta2-]
Whiteboard: [nsbeta-] → [nsbeta2-]
Assignee | ||
Comment 7•25 years ago
|
||
As mentioned above, this problem would go away if the jar protocol began using
the network cache instead. Warren, is this still feasible? Should I mark this
M20, for "some time in the future?"
Comment 10•25 years ago
|
||
Assigning QA to czhang
Assignee | ||
Updated•25 years ago
|
Assignee | ||
Comment 11•25 years ago
|
||
Have fix, waiting on review.
Assignee | ||
Comment 12•24 years ago
|
||
Fixed. We're now using the file cache, which saves files using unpredicatble
names, rather than the jarCache directory, so it is no longer possible for an
attacker to place a file of known content and location on a user's drive.
Status: ASSIGNED → RESOLVED
Closed: 24 years ago
Resolution: --- → FIXED
Whiteboard: [HAVE FIX]
Assignee | ||
Comment 14•24 years ago
|
||
Opening fixed security bugs to the public.
Group: netscapeconfidential?
You need to log in
before you can comment on or make changes to this bug.
Description
•