Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    New Java Vulnerability Allows Sandbox Bypass, Security Firm Says

    Written by

    Brian Prince
    Published September 27, 2012
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Researchers at Security Explorations have uncovered a new critical zero-day flaw affecting all-supported versions of Oracle Java.

      The bug discovery was announced Sept. 26 on the Full Disclosure security mailing list, though technical details of the vulnerability remain under wraps. According to Security Explorations CEO Adam Gowdiak, however, the flaw impacts Java Standard Edition versions 5, 6 and 7 and can be used to break out of the Java sandbox.

      “The issue is tricky to find,” he said. “Same for the exploit code to develop. It would be fair to say that both were of a moderate difficulty.”

      The researchers say they confirmed the bug on the Firefox, Google Chrome, Internet Explorer, Opera and Apple Safari browsers. Oracle has confirmed the flaw’s existence and stated that it will be addressed in a future Java critical patch update, according to Gowdiak.

      The prevalence of Java has made it a common target for hackers, prompting some in the security community to call for organizations to disable the technology if it is not needed. Exploits for Java bugs have become staples of attack kits such as Black Hole and others. There is little danger of that in this case, however, since the bug was disclosed privately, said Marcus Carey, security researcher at Rapid7.

      “There are tons of privately reported bugs for software, which makes it a bit strange that this is generating the amount of buzz that it is,” he said. “Organizations and consumer should always treat Java and other plug-ins as if there are zero-day exploits out there targeting them, even when we don’t know of any specific ones being used.”

      To reduce risk, he recommended that users only install plug-ins when needed and disable or uninstall them if they are unnecessary.

      “If you have to enable dynamic content that requires plug-ins, only do so from trusted sites, as others could very well be compromised,” he added.

      “If there isn’t a reasonable use case for someone to have Java installed, then they can certainly consider removing it altogether,” Satnam Narang, security response manager at Symantec, said in an interview Aug. 30. “However, if there is a use case for having it installed, it’s simply best to ensure that it is patched and kept up-to-date. If there is an exploit in the wild and no patch is currently available, users should disable Java until a patch is made available.”

      Due to the number of people running Java, the potential impact of the bug could affect a large number of desktops, Gowdiak said. The severity of the issue is also critical because of the implications of a full Java security sandbox bypass.

      “What this means is that a malicious Java applet or application exploiting the vulnerability could run unrestricted in the context of a target Java process such as a Web browser application,” he explained. “An attacker could then install programs, view, change, or delete data with the privileges of a logged-on user. In our proof-of-concept code we create a file and execute ‘notepad.exe’ application on Windows.”

      Brian Prince
      Brian Prince

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.