Sorry, No ads on this site.

H a c k e r N e w s N e t w o r k

Defaced Pages Archive

HNN Affiliates

Affiliate Resources

I Want My HNN

Write For HNN

HNN Privacy Statement

Who Is HNN?



1999 Year In Review

HNN T-Shirts

T-Shirt Picture Gallery

HNN News Archive










Freedom of the press is limited to those who own one.
- A.J. Liebling

 

CERT warning? What, me worry?


By: Coris Neme

The February 3 announcement by CERT of a major security hole that affected all Web browsers so badly that they recommended wiping all cookies and browsing only known sites sounded bad--until I read the warning. I'm writing this article for one reason and one reason only: to dispel the FUD and hysteria of this ludicrous "warning". I've seen e-mail virus hoaxes that I was more inclined to panic about.

The supposed danger here, cross-site scripting, is that malicious JavaScript code could appear on a Web page, a newsgroup posting, or an e-mail. (Oh, my! The horror!) You might want to restrain your shock; this isn't news. Malicious scripts, unseen by the average user, have been possible since scripting languages came into being. Poison JavaScript and nasty Java applets are nothing new under the sun. CERT is basically telling us that it's 1996 again.

To be fair, the warning goes into a little more detail: It says that dynamically generated pages could launch JavaScript code unintentionally. Mr. Obvious, it's time for your wake-up call. Any page, dynamic or static or anything in between, can contain malicious code. But if you've disabled the scripting language that the code uses, it's irrelevant where the code came from.

Another point the CERT warning raises is that this so-called malicious code could hide in frame and snoop data from another frame entirely. Sure, if your browser's buggy enough to allow such a thing. Dozens of such vulnerabilities have been removed from both Netscape and Internet Explorer; I think the threat of one frame spying on another is just about over. But hey, if it really was '96 all over again, they'd have an excellent point.

While we're on the subject, why do e-mail and news clients even support JavaScript, anyway? There's no legitimate purpose for it being there, after all, and it just serves as a way for someone to exploit the next big implementation bug that pops up. Had CERT posted a recommendation that all future browsers remove scripting capabilities from their e-mail and news clients, I think the hacking community would have stood up and applauded.

Shall we eradicate our entire cookie file, only browse the sites that are in our bookmarks, and never venture forth onto the Web again because of a sudden warning about a low-grade threat that's existed for nearly half a decade and for which many of the exploits have already been patched? The layman and the newbie are certainly being led to think so. I simply can't believe their recommended course of action--disable all scripting, don't browse promiscuously, and get rid of all your cookies. (I usually wipe most of my cookies anyway, but there are a few I keep.)

I was surprised to see the news posted without so much as an editorial about how outdated and overblown the warning really is. This is 2000, not 1996. Malicious code is still out there and yes, it still can get you; but about the most that it can do is overload your system and force a shutdown or a crash. (Poision JavaScript or Java that causes a crash is usually a self-solving problem. Such code can be found and eliminated; it's not stealthy.) It can't (usually) cause one frame to spy on another. It can't just arbitrarily steal data from your hard drive. It's as dangerous and as harmless in static pages as in dynamically-generated pages.

I think it would be nice to read the news Monday and see that the media, instead of repeating the warning blindly, was now telling the world that the hacking community had denounced the CERT warning for the ridiculous paranoia it really is. Or failing that, perhaps we could get the blueprints to the time machine from whence this message came, and in turn we could deliver our own Chicken Little alerts about events that came and went many years ago. (Brace yourselves; I feel a 1987 coming on.)

Coris Neme

buffer overflow

HNN Store


c o n s
a b o u t
p r e s s
s u b m i t
s e a r c h
c o n t a c t



Today
Yesterday
12/01/00
11/30/00
11/29/00
11/28/00
11/27/00
11/26/00
   
 



These pages are Copyright © 2000 Hacker News Network All Rights Reserved.