Researcher unearths two new Java zero-day bugs

Vulnerabilities affect up-to-date Java 7 browser plug-in, says Security Explorations

By , Computerworld |  Security

A Polish security firm known for rooting out Java vulnerabilities has reported two new bugs in the browser plug-in to Oracle, Security Explorations said today.

On its bug-reporting status page, Security Explorations noted that it had submitted details of the flaws, including proof-of-concept exploit code, to Oracle.

"We had yet another look into Oracle's Java SE 7 software that was released by the company on Feb. 19," said Adam Gowdiak, in an email reply to questions today. "As a result, we have discovered two new security issues, which when combined together, can be successfully used to gain a complete Java security sandbox bypass in the environment of Java SE 7 Update 15 (1.7.0_15-b03)."

Oracle shipped Java 7 Update 15 (7u15) on Feb. 19, bundling patches first released in a Feb. 1 emergency update with fixes for five more vulnerabilities.

The new vulnerabilities affect only Java 7, said Gowdiak in another email. Java 6, which Oracle has officially retired from support, does not contain the bugs.

Java has faced an increasing number of "zero-day" vulnerabilities, bugs that are exploited by criminals before those flaws are patched, or even known by the vendor. Oracle has been forced to rush out patches twice this year to close those holes.

Oracle's latest embarrassment stemmed from a barrage of announcements by several major technology companies, including Facebook, Apple and Microsoft, that hackers exploited a Java vulnerability to hijack computers, including Macs, belonging to their engineers.

Those attacks originated from a popular online forum for iOS developers, iPhoneDevSDK, which hackers had previously compromised, then set up to conduct "drive-by" attacks with Java exploits.

"We were truly surprised to learn that so many high-tech companies had been the victim of a Java security vulnerability," Gowdiak said today. "It looks [like] the warnings regarding Java security problems [that] we've been carrying since April 2012 have not been heard in all of Silicon Valley."

The newest vulnerabilities can be combined to circumvent Java's anti-exploit "sandbox" technology, Gowdiak confirmed, and used to attack machines whose browsers have the Java plug-in installed. He declined to share more information pending a patch from Oracle, other than to say they involved Java's Reflection API (application programming interface).


Originally published on Computerworld |  Click here to read the original story.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question
randomness