Re: kgs and java security hole
Posted: Sat Jan 12, 2013 5:54 am
Macs seem to be covered right now: http://www.macrumors.com/2013/01/11/app ... ty-threat/ (I won't comment about whether this is a good idea or not).
Life in 19x19. Go, Weiqi, Baduk... Thats the life.
https://lifein19x19.com/
this is true of almost all security vulnerabilities regardless of core technology used.speedchase wrote:Edit: I think it is also worth noting that in order for you to be affected by this, you have to go to a website that is malicious, or has been compromised.
Is not that easy... good sites are constantly being hacked, so the people who want to attack the vulnerability can upload his code to a popular web and get as many infected visitors as possible.xed_over wrote:this is true of almost all security vulnerabilities regardless of core technology used.speedchase wrote:Edit: I think it is also worth noting that in order for you to be affected by this, you have to go to a website that is malicious, or has been compromised.
just don't go to those bad sites, and you won't have to worry.
Is C#'s security that bad (wih the latest .net framework)? Can you elaborate?speedchase wrote:People shouldn't hate on Java so much. C, C++ and C# are all much worse when it comes to security, there are literally millions of virus attacks in Windows executable files, and Microsoft's Activex framework is a joke. The only reason people publish articles like this is because they see it as a challenge to try to crack Java's security mechanisms, there is no interest in other frameworks because it is so easy. All security issues in Java are fixed quickly.
my point was more that if people can run programs on your computer, your screwed regardless of what the programming language tries to do to protect you. The only thing this vulnerability allows, if for java programmers to break out of the Java Virtual Machine, and run code directly on your computer. For other languages, there isn't a virtual machine in the first place, so there is no protection to break out from. This issue only stands to make Java more like other programming languages in terms of what a programmer can do to your computer. This is only a big deal because many browsers let Java programs run without asking the user, which is a bad idea in the first place.Kirby wrote: Is C#'s security that bad (wih the latest .net framework)? Can you elaborate?
Fwiw, I'm a java fan, too, but i also like C#. (Well, on that note, I like C++, too... I don't really dislike many languages...)
I think i agree with the principles from which you speak, but perhaps analogous to the jvm, the clr utilized by .net provides security, and c# code isnt run directly, but is constructed into il. So i personally agree that java is not the root problem at times, but it may be a generalization to say its security is superior to. Net's.speedchase wrote:my point was more that if people can run programs on your computer, your screwed regardless of what the programming language tries to do to protect you. The only thing this vulnerability allows, if for java programmers to break out of the Java Virtual Machine, and run code directly on your computer. For other languages, there isn't a virtual machine in the first place, so there is no protection to break out from. This issue only stands to make Java more like other programming languages in terms of what a programmer can do to your computer. This is only a big deal because many browsers let Java programs run without asking the user, which is a bad idea in the first place.Kirby wrote: Is C#'s security that bad (wih the latest .net framework)? Can you elaborate?
Fwiw, I'm a java fan, too, but i also like C#. (Well, on that note, I like C++, too... I don't really dislike many languages...)
Simply put, don't run programs on your computer that you don't know where they came from. The problem is that Java programs can be set up to run automatically. Shame on the browsers for that.
To put this another way -- It's not that Java has bigger security problems than other languages, it's that security problems are a bigger issue when you operate under the trust model that Java does. If the model intends for you to have untrusted sources running code, then a security issue is a larger potential vulnerability than if you expect all code to be trusted prior to execution.speedchase wrote:my point was more that if people can run programs on your computer, your screwed regardless of what the programming language tries to do to protect you. The only thing this vulnerability allows, if for java programmers to break out of the Java Virtual Machine, and run code directly on your computer. For other languages, there isn't a virtual machine in the first place, so there is no protection to break out from. This issue only stands to make Java more like other programming languages in terms of what a programmer can do to your computer. This is only a big deal because many browsers let Java programs run without asking the user, which is a bad idea in the first place.Kirby wrote: Is C#'s security that bad (wih the latest .net framework)? Can you elaborate?
Fwiw, I'm a java fan, too, but i also like C#. (Well, on that note, I like C++, too... I don't really dislike many languages...)
Simply put, don't run programs on your computer that you don't know where they came from. The problem is that Java programs can be set up to run automatically. Shame on the browsers for that.
I thought that C# worked more similar to C or C++ than java. please forgive my confusion, you are correct.Kirby wrote: I think i agree with the principles from which you speak, but perhaps analogous to the jvm, the clr utilized by .net provides security, and c# code isnt run directly, but is constructed into il. So i personally agree that java is not the root problem at times, but it may be a generalization to say its security is superior to. Net's.
I personally find java's power in its portability. Security isnt obviously superior to. Net's imho.
yeah basically.Mef wrote: To put this another way -- It's not that Java has bigger security problems than other languages, it's that security problems are a bigger issue when you operate under the trust model that Java does. If the model intends for you to have untrusted sources running code, then a security issue is a larger potential vulnerability than if you expect all code to be trusted prior to execution.
The solution is to treat Java applets like downloading an executable file. That's basically what it is. Have browsers trust different applets separately based on what the user tells it to do. Don't remember trustAmyTS wrote:It doesn't matter if the site is trusted. The exploit is being deployed through ad networks. If the trusted site uses an ad network that has been compromised with the exploit, and you view that site, and you have a vulnerable version of Java, arbitrary code can be executed on your processor. This doesn't affect the downloaded KGS client, nor does it affect the applet version of KGS, since KGS does not use an ad network.
It's a good idea to disable Java in your browser until you're on a site on which you actually need it (like playing a game).
Thanks for your information. Quite alarming though.Ellyster wrote:@cyclops: .....
unless you are worried about wms hacking your computer, you should be fine. Just use the desktop client.cyclops wrote: Has wms a document around about how he provides safety to us?
Well, next thing now for me is to login to KGS to play a game