Major new security bug in Netscape 65
SCF writes "This article
illustrates yet another browser security bug. This time, it's
in Netscape 4.5. Data from submitted forms stays in the
Windows temp directory for the world to see, exposing any personal
data you've filled out on a site. "
Linux vs Winblows (Score:1)
David
Not my Netscape... (Score:1)
Just goes to show that, while having a secure OS doesn't necessarily make your apps secure, you certainly can't have secure apps on an insecure OS...
That's what you get..... (Score:1)
That is what you get if you think the web is a safe place to buy shit online....
/tmp problem in Linux (Score:1)
And the REAL problem: lots of this nsform* on
Luckily crontab is my friend, and every 3 minutes he kills all nsform* on
Oh, and I forgot to say: at least these nsform* aren't world-readable and world-writable...
Yes, it effects all OSes. (Score:1)
Linux/Unix users - check out your
I can't remember if this is POST format forms only, or GET too. Either way, it shouldn't leave these thing hanging around.
Oh, and it's not just 4.5 - it's every release ever, as far as I can see.
Passwords are left encoded. But not encrypted...
Netscape 4.5 on Linux (glibc-2) (Score:1)
only readable by me (or root, which is sometimes the same)
It also seems to delete those forms after some time
because I submitted couple of forms (via POST) and
all I now have is
and is an empty dir.
It really seems to be windows bug. Besides, if
old netscape versions (or libc5 ? never checked that)
do create files readable by everyone - couldn't I
just write a shell wrapper for netscape which does umask ?
windows = no security (Score:1)
Of course, I clean these out daily with a scheduled batch file. Too much goop accumulates in there. . . (also, tmp files in \WINNT).
How about using Yahoo mail (browser based) - you can see mail messages as plaintext in the cache directory.
Always clear your cache.
I don't see it (Score:1)
Nothing. Does anyone have any hints as to how the file name is generated? Perhaps I can search for it.
Doesn't "Major" overstate this? (Score:1)
I would personally be more suspicious of the waiter in a restaurant jotting that stuff down while they've wandered off to prepare my bill.
Let's be serious about this, ok?
--
I have a solution to this bug (Score:1)
I believe, based on empirical tests (though I haven't confirmed this with Netscape), that the bug occurs ONLY if the TMP and TEMP environment variables aren't set when Navigator loads. I have a habit of configuring my Windows directories as similarly as possible to a UNIX system (i.e. I have c:/home; c:/usr/lib; c:/tmp, etc.). My AUTOEXEC.BAT file says:
set TMP=c:\tmp
set TEMP=c:\tmp
path=c:\usr\bin;%path%
.
.
Check out the Microsoft Windows programming references for the semantics of TMP and TEMP.
I've been scanning for the residual forms files periodically, and they've never been installed in my system. Based on empirical tests, I'd guess that the module that creates them has a hard-coded #ifdef statement or something that affects the Windows version when the TMP and TEMP variables aren't initialized. My C:/WINDOWS/TEMP directory only had one residual file, created last November by Internet Explorer (which I only use for testing the display of our own web pages).
I thought you'd like to know about this. Also, advise your Windows friends NEVER to share their whole C: drive root directory ::grin::
Eugene
Linux vs Winblows (Score:1)
LILO> linux init=/bin/sh
Guess what, your computer just dropped me into a shell without asking for your root password. If you let people in front of your computer, Linux isn't much more secure than Windows. If you don't, at least someone can't telnet into Windows. I'd be more concerned about this being an issue under Linux.
Solutions (Score:1)
Ludo
Just use TweakUI (Score:1)
K
Netscape 4.5 "security bug" (Score:1)
I tried this myself. It does not store passwords, only form data. Frankly there were also
BTW, the temp directory is only in the
I tried logging into 2 sites with secure forms. I filled in new applications for access, replied to the information forms, and kept checking in the background to see what was showing in the temp files. It was not much..
In neither case did the password or login I chose show up.
I agree it is very sloppy programming to allow one application to scribble to temp directories and not clean up. However I can not see this as a big "security" problem.
If someone has the kind of access to a machine to grab the contents of tmp then they basically own the machine and can install all kinds of programs, including but not limited to Back Orifice.
Secure your system (Score:1)
a) Set your computer to boot from HDD only.
b) Require a password on BIOS setting changes.
c) Add the "restricted" keyword to lilo.conf and rerun lilo.
Now nobody gets into your computer without logging in with a valid account or cracking your case.
In Windows 9x, that means:
a) Set your BIOS not to boot without a password
Now nobody gets into your computer at all. If you want to let someone use your computer, you've given them root. Hope they like you.
NT affected too -- more so ! (Score:1)
Yes, it effects all OSes. (Score:1)
That's what you get..... (Score:1)
.
File permissions are a good idea! (Score:1)
And MS was telling us just a few years ago that we didn't even want multitasking...
Obvious hole... (Score:1)
But I'm curious, was this hole discovered because the source was released?
~afniv
"Man könnte froh sein, wenn die Luft so rein wäre wie das Bier"
"We could be happy if the air was as pure as the beer"
Mozilla/Gecko (Score:1)
When I try starting it, I get
error in loading shared libraries: lib/libnspr21.so: undefined symbol: __divdi3
Any idea how to find the missing symbol?
D
Yes, major! (Score:1)
Gonna miss that one anyhow. (Score:1)
If there are there any enterprising win9x programmers around looking for ideas on what to make next, one of you might want to come up with a cleaner that wipes unused files out of the windows temp directory. It might not be a fix for the netscape problem itself, but it'd cover for probably a lot of programs with similar bugs in them.
Not really. (Score:1)
Decide if it hurts or not.
I can't remember if this is POST format forms only, or GET too. Either way, it shouldn't leave these thing hanging around.
Well, I just sent a POST, and a GET form, looked in
It's really a Windows bug. (Score:1)
True, but that's where the 'too much of a pain in the ass to be worth it' factor comes in... anyone who feels the need to sneak into my office at night, disable the alarm on the building, boot up with a rescue disk, search out which drive/partition my Linux files are on, and scan the hard drive just to see what I submitted as for a form really needs to consider seeking professional psychiatric help. (Of course, anyone going to the trouble of doing all that even for a Windows machine for the same reason also needs to visit a good psychiatrist.
It *DOES* affect Linux, too. (Score:1)
A Better OS? (Score:1)
I use Linux: (Score:1)
Really, really, really OLD news (Score:1)