lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 21 Oct 2010 11:22:29 +0200
From: Early Warning <>
To: Michal Zalewski <>
Cc: Roberto Suggi Liverani <>,
	full-disclosure <>,
	"" <>,
Subject: Re: [Full-disclosure] Advisory: Oracle JRE - class - Same-of-Origin (SOP) Policy Bypass

Michal thanks for the reply to defend credits :).

I had some moderation issues when I tried to send some word about this.
Just for sake of clarification:
I sent the advisory to Oracle on 20th April 2010. Oracle acknowledged
the issue on june.

If Roberto sent the advisory to Oracle then Oracle just didn't tell
him they already knew about it.
If Roberto just sent the issue to Apache then no one's faulty. :)
Anyway I hope credits will be at least shared between me and Roberto.


2010/10/20 Michal Zalewski <>:
>> follows responsible disclosure
>> and promptly contacted Oracle after discovering
>> the issue. Oracle was contacted on August 1,
>> 2010.
> My understanding is that Stefano Di Paola of Minded Security reported
> this back in April; and further, the feature was a part of reasonably
> well-documented functionality of Java pretty much ever since:
> "Two hosts are considered equivalent if both host names can be
> resolved into the same IP addresses"
> This was a pretty horrible design, so it's good to see it gone, though.
> /mz
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter:
> Hosted and sponsored by Secunia -

Powered by blists - more mailing lists