Enforcing Java Security Manager in Restricted Windows Environments?
- From: "Jan P. Monsch" <jan.monsch@xxxxxxxxxxxx>
- Date: Fri, 8 Dec 2006 18:05:29 +0100
Lately I came across several Citrix and Terminal Server projects which
provide a restricted set of applications to their users. This is achieved
using Windows Software Restriction Policies or AppSense Application Manager
to white or black list executables.
One of these permitted binaries is often java.exe. Now the problem arises
that once Java is enabled any Java application can be executed on the
system. This allows a malicious user to execute arbitrary Java code, like
replacement shells (JSH), RDP clients (Propero Java RDP) and network port
scanners. I could block java.exe but business requires that the company's
Java application must still work.
This lead me into this research on how to white list Java applications in a
restricted Windows environment. For gory details see:
So all this melts down to my question: Is there a way to tell java.exe to
always use the Java Security Manager without the possibility of manipulation
by the user?
I would be very interested to learn your ideas.
Jan P. Monsch
- Prev by Date: PhpBB Toplist 1.3.7 Xss Vuln.
- Next by Date: iDefense Security Advisory 12.08.06: Multiple Vendor Antivirus RAR File Denial of Service Vulnerability
- Previous by thread: PhpBB Toplist 1.3.7 Xss Vuln.
- Next by thread: Re: Enforcing Java Security Manager in Restricted Windows Environments?