Uploaded image for project: 'Commons Net'
  1. Commons Net
  2. NET-617

Heap Inspection: Passwords can be revealed from heap for ExtendedPop3Client

    XMLWordPrintableJSON

Details

    • Bug
    • Status: Resolved
    • Major
    • Resolution: Duplicate
    • 3.6
    • None
    • POP3
    • None

    Description

      In src/main/java/org/apache/commons/net/pop3/ExtendedPOP3Client.java password is a String. This should be bytes and be cleared after usage.

      Similair issue as https://issues.apache.org/jira/browse/NET-616

      Mitigation: proper protect memory of os process and heap dumps.

      Abstract:

      The method auth() in ExtendedPOP3Client.java stores sensitive data in a String object, making it impossible to reliably purge the data from memory.

      Explanation:

      Sensitive data (such as passwords, social security numbers, credit card numbers etc) stored in memory can be leaked if memory is not cleared after use. Often, Strings are used store sensitive data, however, since String objects are immutable, removing the value of a String from memory can only be done by the JVM garbage collector. The garbage collector is not required to run unless the JVM is low on memory, so there is no guarantee as to when garbage collection will take place. In the event of an application crash, a memory dump of the application might reveal sensitive data.

      Attachments

        Issue Links

          Activity

            People

              Unassigned Unassigned
              dkwakkel Donald Kwakkel
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved: