Vulnerability Development mailing list archives
Re: Exploiting any network protocol with secondarydatachannelsopened from the server
From: weinmann () RBG INFORMATIK TU-DARMSTADT DE (Ralf-Philipp Weinmann)
Date: Mon, 20 Mar 2000 12:08:53 +0100
On Sun, 19 Mar 2000, H D Moore wrote: [...]
Could this applet be used to relay connections to an internal network? Say your target is a dual-homed machine and your applet binds to the external interface and then forward connections to an internal address. Is this possible?
No. The java security manager will only allow you to connect to the machine the applet was loaded from unless the applet has a trustworthy signature. Although there have been bugs in the past which allowed to circumvent that by DNS trickery (browser checked the dns name instead of the ip address) those should now be long extinct. Cheers, -Ralf -- Ralf-P. Weinmann <weinmann () rbg informatik tu-darmstadt de> PGP fingerprint: 2048/46C772078ACB58DEF6EBF8030CBF1724
Current thread:
- Exploiting any network protocol with secondary data channels opened from the server Mikael Olsson (Mar 17)
- Re: Exploiting any network protocol with secondary data channelsopened from the server Blue Boar (Mar 18)
- Re: Exploiting any network protocol with secondary datachannelsopened from the server Mikael Olsson (Mar 19)
- Re: Exploiting any network protocol with secondary datachannelsopened from the server Mr. Pink (Mar 19)
- Re: Exploiting any network protocol with secondary datachannelsopened from the server Ralf-Philipp Weinmann (Mar 19)
- Re: Exploiting any network protocol with secondarydatachannelsopened from the server H D Moore (Mar 19)
- Re: Exploiting any network protocol with secondarydatachannelsopened from the server Ralf-Philipp Weinmann (Mar 20)
- Re: Exploiting any network protocol with secondary datachannelsopened from the server Mikael Olsson (Mar 19)
- Re: Exploiting any network protocol with secondary data channelsopened from the server Blue Boar (Mar 18)
- Buffer overflow in AIM 3.5.1856 Joe Testa (Mar 19)