I installed the gvfs-bin package, and tried:

    gvfs-open /path/to/foo.jar

and it indeed executes the JAR contents.

What do you mean by ``desktop file installed by java''?

On Wed, Jan 28, 2009 at 13:58, Pedro Villavicencio <pe...@ubuntu.com> wrote:
> comment from upstream:
> "does it also happen if you do "gvfs-open /path/to/file.jar"?
> I suspect it's just that you have a desktop file installed by java that
> associates the mime type to this action.
> "
>
> ** Changed in: nautilus (Ubuntu)
>     Assignee: (unassigned) => Ubuntu Desktop Bugs (desktop-bugs)
>       Status: Confirmed => Incomplete
>
> ** Changed in: nautilus
>     Bugwatch: GNOME Bug Tracker #569130 => GNOME Bug Tracker #569129
>       Status: Invalid => Unknown
>
> --
> Opening a Java Archive (.JAR) file executes it regardless of the "executable" 
> permission bit
> https://bugs.launchpad.net/bugs/313439
> You received this bug notification because you are a direct subscriber
> of the bug.
>
> Status in Nautilus: Unknown
> Status in "nautilus" source package in Ubuntu: Incomplete
>
> Bug description:
> Binary package hint: nautilus
>
> 1) The release of Ubuntu you are using, via 'lsb_release -rd' or System -> 
> About Ubuntu.
>
> Description:    Ubuntu 8.04.1
> Release:        8.04
>
> 2) The version of the package you are using, via 'apt-cache policy 
> packagename' or by checking in Synaptic.
>
> N/A
>
> 3) What you expected to happen
>
> Let's have a Java Archive (.JAR) file on the Desktop (default Gnome GUI).  
> The archive has the execute permission bits cleared (chmod 640).  When the 
> archive icon is double-clicked, the archive contents should be displayed in 
> the Archive Manager.  Under no circumstances code contained in the archive 
> should be executed.  Opening files should be safe, regardless of their 
> contents.
>
>
> 4) What happened instead
>
> The archive is nevertheless executed (presumably, java -jar <archive name> is 
> called).
>
>
> 5) Security implication
>
> User can be tricked into executing arbitrary code by opening an 
> innocuously-looking file.  This is similar to the MS-Word macro virus 
> attacks, or a Vim modeline attacks.
>
> 6) Example scenario
>
> Firefox downloads to Desktop by default.  User can specify some file types to 
> be downloaded automatically.  It is reasonable to expect such files would be 
> later opened by double-clicking on their Desktop icons.  The file type does 
> not (necessarily) correspond to the extension; the file name, including the 
> extension, is fully under the control of the attacker.   Firefox will save 
> the file with the file name specified.  When user double-clicks the archive 
> they just downloaded, they expect the contents to be displayed.  Instead, the 
> code supplied by the attacker will be executed.
>
> 7) Workaround
>
> It is possible to change this default behaviour by changing the file 
> association: right click >  Open With > select Archive Manager as the default 
> app to open with.  However, this is not based on permissions, so one has to 
> right click > Open With > java when one wants to indeed execute the 
> application then.
>
> ProblemType: Bug
> Architecture: amd64
> Date: Sat Jan  3 10:12:45 2009
> DistroRelease: Ubuntu 8.04
> Package: firefox-3.0 3.0.5+nobinonly-0ubuntu0.8.04.1
> PackageArchitecture: amd64
> ProcEnviron:
>  
> PATH=/home/username/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games
>  LANG=en_GB.UTF-8
>  SHELL=/bin/bash
> SourcePackage: firefox-3.0
> Uname: Linux 2.6.24-22-generic x86_64
>

-- 
Opening a Java Archive (.JAR) file executes it regardless of the "executable" 
permission bit
https://bugs.launchpad.net/bugs/313439
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to